Date: Wed, 23 Jun 93 04:30:17 PDT
From: Advanced Amateur Radio Networking Group <tcp-group@ucsd.edu>
Errors-To: TCP-Group-Errors@UCSD.Edu
Reply-To: TCP-Group@UCSD.Edu
Precedence: Bulk
Subject: TCP-Group Digest V93 #162
To: tcp-group-digest


TCP-Group Digest            Wed, 23 Jun 93       Volume 93 : Issue  162

Today's Topics:
                           ampr hosts file
                               Help!!!
                        my slip link problems
                         NOS and Serial Ports
                      NOS POP3 and POP2 servers
                             Paclen > 256
                  password in IP timestamp option ?
                      Password security (5 msgs)
                      Print services in ka9q NOS
                           Slip Link ideas
                      TCP-Group Digest V93 #155

Send Replies or notes for publication to: <TCP-Group@UCSD.Edu>.
Subscription requests to <TCP-Group-REQUEST@UCSD.Edu>.
Problems you can't solve otherwise to brian@ucsd.edu.

Archives of past issues of the TCP-Group Digest are available
(by FTP only) from UCSD.Edu in directory "mailarchives".

We trust that readers are intelligent enough to realize that all text
herein consists of personal comments and does not represent the official
policies or positions of any party.  Your mileage may vary.  So there.
----------------------------------------------------------------------

Date: Wed, 23 Jun 1993 06:11:02 +000
From: karn@qualcomm.com (Phil Karn)
Subject: ampr hosts file
To: <n4yyh@wa2hee.ampr.org>, A.D.S.Benham@bnr.co.uk

At 10:23 PM 6/14/93 EDT, Ross Patterson wrote:

>that says you have to be part of net 44, although it is next to impossible
>to get a Class A (i.e. X.*.*.*) or Class B (X.Y.*.*) network address these
>days.

Nothing says you can't just use an address on whatever local network you
happen to be connected. Check out the entries under "ka9q.ampr.org" - you'll
see that most are not network 44.

>>I'm told it can't be done. I'm told "ampr.org" is flat. But I'm not told why.
>
>Gee, that's the easiest question you've asked so far.  Brian Kantor, the
>registered "owner" of AMPR.ORG, wants it that way.  Several folks have
>offered to set up authoritative servers for sub-domains, and each has been
>rebuffed.  From what I hear, Brian feels responsible for the domain, and 
>wants to keep it under his control so he can fix it if it gets broken.  And
>as far as the Network Information Center (NIC) is concerned, he IS 
>responsible, so I guess that makes it his decision.

You make it sound like Brian is being arbitrary - he's not. He's just right.

If you're having trouble keeping a domain database updated in a distributed
fashion, then fix that problem - don't kick it back to the users by forcing
them to add some physical identifer to your domain name, which they probably
won't be able to remember anyway. I've already moved "unix.ka9q.ampr.org"
from New Jersey to California, and it was really nice to not have to tell
everyone to change their addresses for me. All that changed was my IP
address, and the DNS keeps that invisible to the users, just as it should be.

Phil

------------------------------

Date: Tue, 22 Jun 93 17:41:26 EST
From: cheeky@cast.edu.jm (Andrew "6Y5KW" Wilkins)
Subject: Help!!!
To: tcp-group@ucsd.edu

Hi guys,
   I would like some information. I would like to help out the
local College and Univerity with there internet links here in
6y5 land, the cost of the telephone bills is 2 much so i was
wondering if it is leagal for them to use our ax.25 network for
limited traffic with no gateways. I am also experimenting with
Tcp/IP and would use this medium for the transport of such traffic.
   This would also act as a gateway for us Ham operators locally
to get onto the internet. Most of them dont even know a thing
about internet..
your reply would be appreciated....
Tnx de 6y5kw

------------------------------

Date: Tue, 22 Jun 93 06:00:35 CST
From: kf5mg@dfwgate.ampr.org
Subject: my slip link problems
To: tcp-Group@ucsd.edu

Dave,
   I really recommend that you go to your local sidewalk sale and pick up
some used Ethernet cards. I picked up everything needed to hook up 4 PCs 
for under $50. The cards were $5 each and the cables, bnc T connectors and
terminatin resistors were $7 each. For 4 machines, I needed 3 sets of cables
and Ts and 4 boards. So it was $41 total. That even gave me spare Ts and 
terminating resistors. 
   I really thought that it would be difficult, but it wasn't. Yon need to 
have an ethernet board and BNC T connector for each PC. Then you need a 
piece of RG-58 A/U coax between each station. Each end station needs a 
terminating resistor. You can make one or get them premade. All you need is
a 50 ohm resistor that connects the center pin of a BNC connector to the
outside. It was easier to use a RCA phone plug and a RCA to BNC adapter. 
You also need to ground one of the terminating resistors to the PC's case. 
I ran a wire out the back of the RCA connector for that. This may only be
needed for really long cable runs. 
   Anyway... that's the route to go. Quick and painless. 
 
73's  de  Jack - kf5mg
AMPRnet         -  kf5mg@kf5mg.ampr.org       - 44.28.0.14
AX25net         -  kf5mg@kf5mg.#dfw.tx.usa.na - work (817) 962-4409
Internet        -  kf5mg@vnet.ibm.com         - home (817) 488-4386
-------------------------------------------------------------------
|   "I am Homer, of Borg...prepare to be assim -- ooo, donuts."   |
-------------------------------------------------------------------

------------------------------

Date: Tue, 22 Jun 93 13:23:50 -0400
From: Terry Stader - KA8SCP <p00489@psilink.com>
Subject: NOS and Serial Ports
To: Mr. Sampson <ssampson@sabea-oc.af.mil>

Steve... (and others) I have been running NET/Mac on my Mac and my PC using 
38.4K on a slip link with NO problems what so ever. The version I am using is 
the 386/486 optimized version by N1BEE. I like the front end of NOS over NET 
on the Mac and therefore the PC is the machine that talks to the TNC.

I have configured it as a vc and it works like a charm.

Terry - KA8SCP
America Online Ham Radio Club Host
tstader@aol.com
p00489@psilink.com

------------------------------

Date: Wed, 23 Jun 1993 05:34:53 +000
From: karn@qualcomm.com (Phil Karn)
Subject: NOS POP3 and POP2 servers
To: <ashok@biochemistry.BIOC.CWRU.Edu>, erik@marge.phys.washington.edu

>>However,  the bugfix follows Phil Karn's advice, "Accept liberally, send
>>conservatively".

To give credit where credit is due, I think Jon Postel originated that
phrase, not me. The original was something like "The Internet Implementer's
Creed: Be liberal in what you accept, conservative in what you send". I even
have it emblazoned on a IETF coffee mug.

Phil

------------------------------

Date: Tue, 22 Jun 1993 13:12:06 -0500 (CDT)
From: Mr. Sampson <ssampson@sabea-oc.af.mil>
Subject: Paclen > 256
To: TCP-Group@UCSD.Edu

Jon Jagger <J.R.Jagger@sheffield-hallam.ac.uk> says:
> 1.  I've been looking into using a paclen value > 256.
> Some docs I read state that some versions of ax25 can't
> handle this...

Actually the AX.25 specs say 256 is the limit.  If you use more than 256
bytes you are not using AX.25 anymore (sort of like the NTSB who says that
if an engine falls off a DC-10, that you are now riding an experimental
aircraft, not a DC-10).  Of course the rules get more strict (unspecified
code).  I don't know UK rules, but US rules say 256 bytes are the max in
connected mode (paclen only applies in connected mode).

You can use unconnected mode (UI) with any size packet, and is much more
preferable this way.  You probably have a machine you want to connect to that
is only reachable via connected mode, but I haven't seen many nodes (Net/Rom or
Rose) that can pass 128 byte packets without choking up, so 256 bytes is
really too much, and more is worse.
---
Steve, N5OWK
"The bad thing about all the food we're dropping in Bosnia is that it has
a lot of saltpeter in it.  After all, it was made for US troops" - UN

------------------------------

Date: Wed, 23 Jun 1993 06:02:19 +000
From: karn@qualcomm.com (Phil Karn)
Subject: password in IP timestamp option ?
To: J.R.Jagger@sheffield-hallam.ac.uk, tcp-group@ucsd.edu

At 05:02 PM 6/14/93 GMT, Jon Jagger wrote:
>Hi,
>I've been reading RFCs in my search to find a way to insert
>a password into an IP packet header. I think I may have found a way.
>Firstly I note that no NOS code I have yet looked at implements
>the timestamp ip header option, but all honour the ip.optlen
>setting.

Once again, I *strongly* urge anyone interested in experimenting with
IP-level security to do so by creating a pseudo-protocol that sits above
IP (and below TCP or UDP), rather than by adding IP header options. It's
much cleaner layering, easier to implement, less likely to get into
compatibility problems with other implementations, and you have as much
room as you need, too.

Phil

------------------------------

Date: Tue, 22 Jun 93 14:54:17 PST
From: "Jerzy Tarasiuk" <JT@zfja-gate.fuw.edu.pl>
Subject: Password security
To: tcp-group@ucsd.edu

I have the MD5 algorithm .ASM code linkable to Turbo Pascal ready -
for TP only, it is in MD5P.ZIP, for TP and C (all memory models) in
MD5M.ZIP (both in guest directory on zfja-gate, 148.81.6.100). 73's

------------------------------

Date: Wed, 23 Jun 1993 00:28:30 +000
From: karn@qualcomm.com (Phil Karn)
Subject: Password security
To: jt@fuw.edu.pl, samisen!djc@sol.UVic.CA, tcp-group@ucsd.edu

At 05:32 PM 6/14/93 +0200, jt@fuw.edu.pl wrote:
>I have rewritten some of MD5 code (MD5Transform function) in assembly
>- speed increased over 3 times on every machine, now MD5Transform times
>are: < 8 ms on slow 4.77MHz XT, < 1 ms on 12MHz AT, < 700 us on 16MHz
>386, < 170 us on 16MHz 386 with use of 32-bit registers.
>(I will make the assembly code available when I finish it).

FYI, the version of md5.c in my current version of NOS (on ucsd.edu)
includes assembler code for the 386/486. It's configurable (you fall
back to the original C code for the 286) and it's about as tight as I
could possibly make it.

Phil

------------------------------

Date: Tue, 22 Jun 93 22:53:32 PDT
From: enge@almaden.ibm.com
Subject: Password security
To: TCP-GROUP@UCSD.EDU

I have joined the MD5 bandwagon and am going to use that in my
authentication scheme.

Roy, AA4RE

------------------------------

Date: Tue, 22 Jun 93 22:50:23 -0700
From: karn@qualcomm.com (Phil Karn)
Subject: Password security
To: MIKEBW@ids.net, samisen!djc@sol.UVic.CA, tcp-group@ucsd.edu

>Your recursive password scheme is very interesting, but I think it has
>a potential vulnerability.  All passwords S(i) where i > 0 are known to
>be a result of running MD5 on S(i-1).  This places some severe constraints
>on the search space when trying to deduce S(i-1) from S(i), the kind of
>attack which MD5 is normally intended to defend against.

If MD-5 is as its designer claims it to be, there is no practical way
to determine the required MD5 input that produces a given output,
other than by trying all possible inputs. Knowing that the input is a
fixed 128-bit block doesn't help much, since 2^128 is still a *very*
large number, and on average you'd have to try half of them (2^127).

>  For example,
>the simple fact that MD5 outputs a 128-bit results, such that all S(i)
>where i > 0 are known to be exactly 128 bits, makes an attack easier by
>orders of magnitude.  Still worse, it may turn out that MD5 under some
>special conditions (such as 128-bit inputs) does not exhaust its range
>space, such that a slightly modified brute force attach would be feasible
>in a reasonable amount of time.  The unspoken assumption underlying MD5
>is that it is a "message digest" of some sufficiently long string of bits.
>If MD5 is used to process very short messages, it may not turn out to be
>secure at all.

I don't think this is a problem. The stated properties of a strong
message hash like MD-5 are: 1) it is computationally infeasable to
find two messages that hash to the same value, and 2) it is
computationally infeasable to find a message that hashes to some
particular value.

BTW, property #1 is why MD-5 produces such a large hash value (128
bits); "birthday attacks" could be used to find two messages that hash
to the same value even though a 64-bit hash value would be sufficient
for property #2.

Once again, I implemented this exact scheme several years ago at
Bellcore, only I used MD4 instead of MD5, and each iteration folds the
MD-4 output down to only 64 bits to keep the key size manageable.
Bellcore has since trademarked it as "S/KEY" and is using it on
several of their machines as an alternative to the overpriced and
inflexible (literally!)  SecureID card. S/KEY has a few user-friendly
features, such as the option of typing in your one-time password as
six 3- or 4-letter English words from a built-in dictionary instead of
as 16 hexadecimal digits.

Phil

------------------------------

Date: Wed, 23 Jun 93 11:40:07 PST
From: "Jerzy Tarasiuk" <JT@zfja-gate.fuw.edu.pl>
Subject: Password security
To: karn@qualcomm.com (Phil Karn)

> Message-Id: <9306230026.AA21459@qualcomm.com>
> Date: Wed, 23 Jun 1993 00:28:30 +000

> FYI, the version of md5.c in my current version of NOS (on ucsd.edu)
> includes assembler code for the 386/486. It's configurable (you fall
> back to the original C code for the 286) and it's about as tight as I
> could possibly make it.

I tried the code right now and found some optimizations can be made.
Wrote them and tried to compile - first your original source code:

1. Without specifying -DCPU386 I was unable to compile it!!!
  Tried: TC 1.5, TC 2.0, TCPP 1.01, BC 3.0, MS C 6.0
  Errors: macro expansion too long in every, GP fault in BC 3.0

2. Specifying -DCPU386 and using BC 3.0 or TCPP 1.01 (other compilers
  didn't accept it), I compiled it and found the digest values doesn't
  match test suite from RFC 1321. And it is compiler-dependent!!!

I tried to compile code with my modifications - seems result are as
specified in RFC 1321, using TC 2.0, TCPP 1.01, BC 3.0 to compile it
(for TC 1.5 I got same results when I copied TASM.EXE to MASM.EXE -
 it attempts to use MASM and .ASM code is not MASM-compatible).

After some attempts to isolate the change which caused code to become
correct, I found your assembly code always accesses the 64-byte data
as far, regardless what memory model is used. Probably the compilers
I used have default small-data memory model (small or medium).

The version MD5.C I tried was revision 1.5 (from RCSDSRC.ZIP).
I put diffs in file MD5DIFF.ZIP and RCS file in MD5RCS.ZIP on
zfja-gate (148.81.6.100) in guest login directory.

A question: is the 'tight' intended to mean 'small' ? The MD5 code
is optimized for speed rather than for size, suppose can save many
kilobytes of code size even in pure C. Try make it smaller ?
73's, Jerzy

------------------------------

Date: Tue, 22 Jun 1993 09:58:52 -0600 (CST)
From: "Erik Olson" <erik@marge.phys.washington.edu>
Subject: Print services in ka9q NOS
To: TCP-Group@UCSD.Edu

> I work with PA0GRI's NOS version (2.0m) and I wish to use the
> print services built in source code. Naturally I compiled the executable
> with the client and server LPD and  I think all is right .
> But I do not know how to operate with LPD.
> I can imagine the I have to attach the asyncronous com port with "raw" mode,
> but can I use the parallel port ? if yes , How?

To use the parallel port, you just need to specify it in the /etc/printcap
entry.  I beleive it's a matter of including the specification "lp=LPT1".

> And then how can initialize the print server lpd apart to give nos the
> command "start lpd"?
> The PA0GRI documentation is lack about that , so I wonder if someone has
> experience on it.

The original code is available, with documentation, from the ftp site
tacky.cs.olemiss.edu.  I might also take the moment to plug the NEW RELEASE,
which I've been told is due out any day now (says Dave, the author)...
Having ironed out a few of the bugs in it, I'll advertise:  it doesn't tie
up NOS while printing anymore, the tabs work right, it knows how to recover
when a job is removed, etc etc, and it's now based on ka9q 9305xx!!

   - Erik
---
Erik Olson (in lab)                      erik@marge.phys.washington.edu
University of Washington                      olson@phys.washington.edu
Cosmic Ray Lab, Phys. 405

------------------------------

Date: Tue, 22 Jun 93 07:28:53 MDT
From: "Karl Larsen" <klarsen@centaur.arl.army.mil>
Subject: Slip Link ideas
To: tcp-group@ucsd.edu

     I am using a pair of Twincomm V.32bis modums to connect my 2
jnos 1.08b systems. The attach slip was simple but getting the
modum initallised properly was not. You must have &C1 &D2 for a
start and E1 so the modem sends english to your computer and X4 so
it sends the long set.

     I have clocked the link at 26,000 bit/second on plain text.
The v.42 hardware archive seems to work well. The computers have
plain com port cards. One is a combination com, printer, IDE hard
drives and floppy controller that cost $14.95 from a mail order
place in CA. Nothing special...I also use a program that allows
transferring data between computers at 115,000 bit/second and it
works fine too.

     The thing that slows down telephone slip connections is
almost always the modum, or it's setup. There ARE good and bad
Modems. I am a node of the Fido Net and we have experts on modums.
I refuse to include my setup because it works for my modem, but
almost for sure it won't work on yours.


     73, de karl


 _________________________________________
 | Internet klarsen@centaur.arl.army.mil  |
 |     Fido 1:381/401                     |
 |   k5di@k5di.nm.usa.na                  |
 |    Ham IP 44.30.2.5                    |
 | (505) 678-3145 weekdays 524-3303 home  |
 |________________________________________|

------------------------------

Date: Wed, 23 Jun 1993 06:59:11 +000
From: karn@qualcomm.com (Phil Karn)
Subject: TCP-Group Digest V93 #155
To: "Brian Ellsworth, Otis Service Center; 203-286-1606" <ELLSWORTH%BRAVO@utrcgw.utc.com>,

At 09:57 AM 6/16/93, Brian Ellsworth, Otis Service Center; 203-286-1606 wrote:

>Gee, i thought this was something we 'NOS users' (as opposed to
>developers, i guess) just had to live with ! I've been running a
>minimized version of PA0GRI's 2.0m for months, just using the asy
>driver to a 9600 baud TNC and it ROUTINELY gets crashed by over
>zealous pingers testing the 9600 baud repeater system. Generally,
>it appears that NOS sucks up all the available memory, then dies.
>Seems like there is more than the pktdrvr at fault here.

Well, yeah. I confess that NOS is not very graceful when it runs out of
memory. But there are some things you can do to reduce the probability of
that happening.

Recent versions of my base code (within the last year or so) have a
"random quench" feature. If you set the "qlimit" parameter on an interface,
you enable this feature. Whenever there are already "qlimit" packets on
an output queue and another one is queued, the system will pick a packet
already on the queue at random and send the originator an ICMP source
quench message. The original packet is left on the queue. The idea is to
slow down the senders who are congesting your queues without actually
dropping their packets.

Of course, this assumes that the sender obeys ICMP source quenches. This
is true for my own TCP, but ping and UDP do not. I agree that it shouldn't
be possible to crash NOS no matter what you type, but if the problem appears
only when generating artificial traffic with ping, then the old joke comes
to mind:

Patient: "It hurts when I do this!"
Doctor: "Well, don't do that then!"

--Phil

------------------------------

End of TCP-Group Digest V93 #162
******************************
******************************