Sunday, December 28, 2008
Retroactive change?
Grandstream GXP-200 BLF
Thursday, December 25, 2008
More phones than I know what to do with...
- 2 two-line phones
- 2 four-line phones
- a Phillips DECT 6.0 cordless with two handsets
- and a Linksys SPA-3102
Wednesday, December 24, 2008
Weather update
Sunday, December 21, 2008
Wake-up weather
Lesson learned: scheduled backups are fine when little happens in between. If you code heavily, backups should occur more often!
Saturday, December 20, 2008
VoIPSupply
On a related note: Sparks! Phones for your Greenville trip won't be an issue.
Monday, December 15, 2008
Liquidsoap daemon script
Monday, December 8, 2008
Starbucks++
Saturday, December 6, 2008
Liq + Icecast error
2008/12/06 09:50:33 [threads:1] thread "root" aborts with exception Shout.No_connect !
2008/12/06 09:50:33 [main:3] Shutdown started!
2008/12/06 09:50:33 [threads:3] thread "non-blocking queue #1" exited (1 remaining)
Thread 4 killed on uncaught exception Shout.No_connect
Sunday, November 30, 2008
Adding res_mysql to F10 Asterisk
Thursday, November 27, 2008
F10 Asterisk bug fix
27 AST_CONFIG=/etc/asterisk/asterisk.conf
88 ASTARGS="$ASTARGS -C $AST_CONFIG/asterisk.conf"
The fix is to drop the "/asterisk.conf" from the end of line 88.
Fedora 10
In any case, it appears to be going much smoother than previous Fedora installs. Sparks is doing a similar install across town. He has voiced similar opinions.
Fedora 10 and NVidia cards
The problem is that F10 has a chicken/egg issue involving installation. You need the NVidia driver to get the xorg.conf you need to modify to see the cursor and you need the cursor so that you can click on the link on the NVidia website.
The bad news is that you'll have to guess where the cursor is, on the screen, a number of times. The good news is that it isn't that difficult. I had mine working after about 5 minutes of frustration.
Sunday, November 23, 2008
Improved Conference Manager
- Volume controls for talking and/or listening for individual callers
- Volume controls for talking and/or listening for the entire conference
- Hangup a specific caller
- Kick (hangup with message) a specific caller
- Mute/unmute a specific caller
- Mute/unmute all callers in conference
- Lock a conference (block anyone else from joining the call)
- Unlock a conference
- Record/stop recording the call
- Make a call from the conference room
- Create/edit/delete conference rooms on the fly
Friday, November 21, 2008
When worlds collide
- generate wiki pages to show off the conference room manager
- solder together a serial-to-IR interface for MythTV and document it
- clean the entire house, top to bottom (company coming)
I wonder how much this will conflict with... What's that? Yes, dear...
Thursday, November 20, 2008
Yawn!
Sunday, November 16, 2008
Back online
One loss is the ability to use LiquidSoap as a source for hold music in Asterisk (even though the capbility can be recovered, it doesn't yet "fit well" with Icecast or Asterisk inputs).
At first, I attempted to use 64-bit Linux, with the objective of using LiquidSoap for a number of features. I had so much difficulty in getting Liq to work that I abandoned the 64-bit effort. Little did I know that it wouldn't work in 32-bit either.
To make a long story short, time constraints have left me with a 32-bit box with a borked Liq (only plays OGGs) and a number of work-arounds to get a few functions (Asterisk, MythTV, etc.) working. I've even resorted to using SqueezeCenter as a hold music source in Asterisk. It's overkill, using way too many processing cycles to provide a single function, but it works.
Thursday, November 6, 2008
Temp offline
Sunday, November 2, 2008
AOL
If 1 in 200 messages is infected, I'd guess that 1 in 400 is a return message (I receive a lot of these). Although the mail was sent with good intentions, it demonstrates a lack of understanding of infection vectors and is basically a waste of resources. For AOL, the message size was 4K. Because it was an error message, it was sent to my account and root on my mail server, so I get to delete this twice. This also ate up 8K of bandwidth. For me, it's not that bad. For AOL, it has to be monstrous (i.e., they're wasting their own money).
If your anti-virus utility scans inbound email for viruses, please TURN OFF your auto-response feature. It actually compounds a number of problems (bandwidth, storage) rather than prompting the owner of an infected machine to fix his junk.
Friday, October 31, 2008
Scary item for the holidays
There, that should scare the beans out of some of you (me, offering up a workable MS tip). Happy Halloween!
Monday, October 27, 2008
Wut?!
Sunday, October 19, 2008
Copying between wikis
Saturday, October 18, 2008
Monday, October 13, 2008
Sunday, October 12, 2008
Saturday, October 4, 2008
Myth and MVP
The SageTV server hasn't been able to adjust recording times for those channels that start a minute earlier than expected. Yes, I know that this is more of a function of their scheduling service. The television schedule was part of the commercial package that I bought. It is much, much more inaccurate than the scheduling service (which I also paid much less for) for MythTV.
SageTV also loses to MythTV in the comparison of web interfaces for scheduling recordings of favorite shows. SageTV really doesn't have a "Favorites" feature unless you're willing to edit menu_items.js and then manually pick your shows. MythTV tracks your favorites, can automatically deconflict same-time recordings, and requires much fewer clicks to work around issues (if you need/want to take care of them manually).
SageTV has an interface to Squeezebox that will only play locally on the server. MythTV's interface (Slimp3) actually plays remotely, through the MVP box.
For remote access, you still need a client program for SageTV. For MythTV, the standard media players (Windows or Linux) will work via the web interface.
The extra features that SageTV does have (the ability to play directly off of GoogleVideo or YouTube, a handful of useful plugins, etc.), I can live without.
MythTV's shortcomings are minor. It isn't as hackable as SageTV (yes, the commercial product was easier to work with) and the community is a bit more friendly (I got a lot of abuse from the Myth developers for attempting to code something different from _their_ way. They actually were a bit proprietary about the code (they were angry that I was rewriting their code to do something they deemed useless)). You'd think that it'd be the other way around.
I stuck with SageTV for a very long time (through 2 versions), well past the point where MythTV was a better choice for me. I think this was caused by the manual configuration requirements needed for MythTV. (I could just never find the time to play with it.)
In any case, for those of you in the VPN (mostly those living in the house), the Sage interface is being taken down. The old rules of use for Sage now apply to Myth. For everybody else, notes in the wiki have been updated here and here.
Monday, September 22, 2008
Fixing sound files generated with Cepstral
The problem is that Asterisk is expecting an 8 kHz wav while Cepstral generates 16 kHz wavs (for most of its voices). You're faced with regenerating the files or transcoding them. Depending on the number of files, one method or the other will be preferable. I've put both methods in the wiki.
Sunday, September 21, 2008
Cepstral and app_swift
Sunday, September 14, 2008
ShmooCon 2009
Saturday, September 13, 2008
Fat fingers
I've updated the wiki notes to show the proper method.
Saturday, September 6, 2008
Tiddly Gushy
A coworker showed me TW a couple days ago and I haven't put it down since. It's a tool that I've been needing for a very long time now.
For those that don't know, it's a wiki written in JavaScript, meant to run from the local file system (e.g., hard disk or thumb drive). It looks like it'd make a good index tool for CDs or DVDs full of miscellaneous kruft. It looks like it'd make a good container for various beginner's guides also. I'll keep you posted.
Monday, September 1, 2008
IAX?
Sunday, August 31, 2008
Firefox locking up
Friday, August 29, 2008
Life expectancy?
My wife has various pictures of her and her sibling's childhoods. [insert evil laugh here] I imagine that my in-laws will be forming a lynch mob sometime around Christmas.
Saturday, August 23, 2008
Frustration
Saturday, August 16, 2008
Adding and deleting pages on Google
Friday, August 15, 2008
Stop yer whinging!
Really want to know how they did it? Go back and take a look at their stats for the past 7 or 8 years. Notice how they almost always were in the top four finishers but most often had the suckiest "defense" stats? Care to guess what they fixed this year?
As for the other teams, they didn't place first but they definitely didn't place last. Those that actually played had to beat out nearly 400 other entrant teams (we're talking thousands of people here!). They all busted their humps to get there.
It is hilarious though, seeing team points graphed over time, with the Bossman narrating (similar to the effect of shifting into the next higher gear when the guy you're racing thinks you were at top end). Before you start buying torches and pitchforks, he was respectful of the other teams. Mebbe we can get him to digitize the commentary? (hint, hint!)
Thursday, August 14, 2008
Adding and deleting pages on Google
Wednesday, August 13, 2008
He's so cheap that...
Example 1: The local Walmart dumped their shelf of Linksys PAP2's for ten bucks a pop. I donated them to Sploitcast and they were (mostly) given away at this year's Shmoocon.
Example 2: I just picked up an ATI HDTV video card for thirty bucks. I think the little OTA antenna may be missing but the price was low enough to be interesting.
Now my only problem is that I'm running out of slots.
Tuesday, August 12, 2008
Backdoor dialing
Sunday, August 10, 2008
MythTV and XMRadio
- you need to run xamp as the mythtv user at least once from the command line
- and you need to create the /home/mythtv/.xmonline folder (as the mythtv user) before you run it from the command line
Other than that, it's a pretty straight-forward install. My notes are here.
Sunday, August 3, 2008
Ordering Pizza Without a Phone
Saturday, August 2, 2008
Attack trees
Semi-related to Spark's topic is the following: attack trees. A good starting place is Wikipedia's article on attack trees and Bruce Schneier's 1999 paper on the topic is also a very good read.
Sunday, July 27, 2008
Openfire notes
I also learned (the hard way) that if you use the embedded database (vice an external one) for Openfire, you'll run into issues with configuring the Asterisk-IM plugin.
I'm having a bit of fun with Openfire (the server) and Spark (the IM client). The Asterisk-IM plugin announces inbound calls with pop-up windows using Spark. Openfire also has a gateway function for just about every IM available. This allows you to see when your friends are online (or chat with them), even in IRC, without having to start up a dedicated client for whatever individual service they might be using.
OpenMeetings update
Thursday, July 24, 2008
WiFiDog status
One side project though, the documention. The current stuff is a bit sparse.
Saturday, July 19, 2008
Ow! My eyes!
Friday, July 18, 2008
Intrinsic.h errors
error: X11/Intrinsic.h: No such file or directory
The correction is to load the latest development version of libxaw.
Wednesday, July 16, 2008
WiFiDog update
Sunday, July 13, 2008
Saturday, July 12, 2008
OpenVPN
Monday, July 7, 2008
Abandonment
I've enjoyed using it for the last three years. It has quite a few features that the other DVR software packages don't. Plus an active support community. Plus being user-extensible.
The problem is that the version that I've purchased is starting to have some serious issues, mostly by not playing well with various upgrades to my system. Having to maintain two versions of Java (the older one for SageTV) and a number of legacy libraries was a serious P.I.T.A. On top of that, the online sources never really worked all that well (which can be blamed mostly on the serious shortage of documentation for the Linux version).
In any case, I'm considering moving away from SageTV. I really don't want to purchase the newest version. MythTV appears to have most of the features that I want and I'm willing to invest a few hours to get it up and running. I'll keep you posted.
Sunday, July 6, 2008
OpenMeetings Status
I'm hoping that I find a howto or a troubleshooting page soon. That's the trouble with in-development code: documentation tends to be a bit sparse. Notes here.
Retreating
The problem is that stress conforms to many "laws" that physical objects do. In other words, the stress doesn't disappear just because you're not in it at the moment. Rather, the majority of it gets transferred to your coworkers and friends. In fact, it actually creates more stress from the inconvenience it creates on those friends and coworkers.
Translation: Sparks! Dammit! Answer your phone! You're not going to Denver on Monday!
Friday, July 4, 2008
OpenMeetings
Feeds update
Thursday, July 3, 2008
SqueezeCenter
Sunday, June 29, 2008
Monday, June 23, 2008
Forcing an EPG update in SageTV
Now go check your SageTV homepage (if you have the web interface installed). The datestamp for the "Last EPG Update" should be right about when you clicked on the channel button the second time. (Wiki notes here.)
Friday, June 20, 2008
Monday, June 16, 2008
Video phones
Case in point: a setup where the GXV-3000 calls an X-Ten softphone. The video from the GXV-3000 is quite nice, the X-Ten softphone displays it without any problems. It even scales well.
The X-Ten softphone, however, has issues with its own video stream. On an 800 MHz machine, it has a lag which noticebly grows over time, until the application is running so slow that the program's buttons are unuseable until you hang up from the other end. (The video from the GXV-3000 keeps up during all this.)
(Note: On a 1.2 Ghz dual core, it appears to keep up.)
A N800-to-GXV call is a bit different. The N800 is able to keep up. It's just that the resolution of the camera on the N800 is just so low that the picture on the receiving end is comprised of giant pixels and overdriven colors. It's just too dang ugly to look at!
My recommendation is to try and maintain end-point parity (use the same hardware or software on both ends). That way, it may be a bit ugly but you don't end up comparing mediocre (the soft phones) with the good (the hard phones).
Monday, June 9, 2008
Innocent bystanders?
What gets my hair standing on end is that certain organizations are trying to get laws passed to criminalize file sharing (vice being a civil matter), yet they can't do their own dang research properly.
Be sure to click on the links for the authors. They have some other interesting projects going on.
Note: the Slashdot article pointed only to the UW research paper, this is the associated web site. Free Printer741 now!
Saturday, June 7, 2008
Nothing
Thursday, May 29, 2008
Web 2.0, The New Brain Sucker
Nowadays, I don't write much and there aren't many topics not covered by a blog. Also, you don't have to travel too far to find any two security experts willing to contradict one another.
As such, I am attempting to crawl out of the RSS sinkhole and go back to researching the more cutting edge stuff. I may blog about it, I may not. To help do this, I'm pulling the plug (unsubscribing) from all of the feeds that I read (there's over 300 of them), except for those of a few close friends and one or two high signal-to-noise feeds.
For those of you that are totally immersed in RSS feeds or other forms of social network (yeah, you guys in the Twitter pool are included), the world is passing you by. Take a look around. The time that you used to spend coding or researching a topic has now disappeared into "reading time". You're probably spending the majority of your free time following the kruft growing in other peoples' lives or watching a couple security "experts" bicker.
If you're skeptical of my intent or even just of my possible success, you can call it a blogger's mid-life crisis. Me, I'll call it an escape attempt.
Tuesday, May 27, 2008
Product prejudice
The company may have had some crappy products in the past, but I've used a number of their products recently and I'm quite happy with them. Admittedly, the previous firmwares did cause a number of unbearable issues but the current versions work quite nicely. I'd recommend taking another look at the Grandstream stuff if you're needing some cheap equipment. Some of the newer models have a few bells/whistles that you might be interested in, too.
Monday, May 26, 2008
It's the little stuff
The answer is quite simple: if you're sucking off of a stream, comment out the line that starts with "directory". You only need the "mode" and "application" lines.
How do I know this? Well, let's just say that I spent a few hours today, tracing just that very problem.
Thursday, May 22, 2008
Grandstream GVX-3000 video phones
Tuesday, May 20, 2008
Overkill
(To borrow from the real SJ) Oh! And one more thing... Converting a crappy stop-motion animation to "high def" doesn't mean that I'll consider buying it, especially when it's placed somewhere around minute seven in the previews of other movies that I'd never watch/buy, with the fast forward feature disabled. It's enough to make you barf your popcorn back up!
Yeah, I'm in a mood. What of it?
Sunday, May 18, 2008
Please!
Anyone care to join me in pestering various sites about their tagging capabilities?
Sunday, May 11, 2008
Using the Gizmo software with Asterisk
Friday, May 9, 2008
Wrong! Wrong! Wrong!
Sunday, May 4, 2008
Numbers
Saturday, May 3, 2008
Switching languages
I'm able to adjust volumes now!
Tuesday, April 29, 2008
Gizmo, Grandstream, and Asterisk
To add local inbound calls from POTS, I pointed my GrandCentral (GC) account at Gizmo. (They do that now.) This was the tricky and annoying part because the console showed that the call had been answered but the calling phone was still ringing.
When I stuck a conference room into the mix and dialed into that with a third phone, I realized that GC was using an IVR on the receiving end (i.e., "Press 1 to accept the call, Press 2 to send it to voicemail, etc.). In other words, it requires human intervention (i.e., you must press 1 to accept a call).
That's not to say that it can't be worked around. You can either have Asterisk push it immediately to a hard phone (if you expect to treat is as it was intended) or you can "trick" the IVR into delivering the call with the SendDTMF command (notes here). In either case, I now have a local inbound number for free!
Sunday, April 27, 2008
VoIP Resources
Saturday, April 26, 2008
Yeah! Wut?
I think that by using the phrase "by ensuring a relatively bug-free implementation of IP", it's a indication that Alec:
- wasn't there,
- was in marketing (and therefore ignored anything the programmers said), or
- is just a clueless journalist
A little research shows that he was actually a director of marketing, meaning that (at best) he knew the features but not the bugs.
Windows 95 had a secure TCP/IP stack?! Buahahahaha....[**gasp**].hahahaha....
For some reason, Alec has no memory of the horrendous amount of crap and pain we (as network operators) went through in the late 90's and early 00's. Could there have been that much separation between the various MS departments at the time?
Monday, April 21, 2008
Nested calls
New subscriptions
Although most won't hold up under continued review, I've picked up 18 new Asterisk-related subscriptions. You can grab a copy here.
Saturday, April 19, 2008
Thursday, April 17, 2008
Sunday, April 6, 2008
Simple hot-desking
Wednesday, April 2, 2008
Going too far...
Okay, I was a bit miffed. However, I read the details of the error message and visited the site. It said that I could have the block removed by sending a copy of the message to thisisnotspam@cox.net. I did so and received the following:
Okay, I'm now livid. The short version of the 5-minute screaming fit that I have in my head boils down to: Why are you filtering my outbound mail? Am I flagged as being a spammer because I send 5-10 messages per week?
Grrr...
Sunday, March 23, 2008
Passing values back to the dial plan
Thursday, March 20, 2008
Goolag redo
A little bit of design knowledge (instead of "adapting" formats) and visitors might not make the incorrect assumption. Mixing what is supposed to be a legitimate link for a download into what is supposed to be a parody leads to confusion such as this. It's like your pastor telling a dirty joke during a sermon. At best, it leaves people scratching their heads.
Again, my apologies for the confusion, especially to Corey Nachreiner.
To the guy calling himself "ass", I won't "moderate your comment up". You've yet to say anything constructive. I've posted this retraction instead. Please realize that I've never claimed to be a "l33t h4x0r" like you. In any case, from this humble n00b, thank you for your input!
Unrequested assistance
Note to everyone else: The Grandstream Budgetone 102 will do that if _SOMEONE_ (*ahem*) plugs the cable into the "PC" port vice the "LAN" port.
I refuse to ask how she thought that her computer was plugged into the phone (okay, maybe the _do_ both have blue cables) but I refuse to feel guilty that it took 15+ minutes to find that (yeah, I'm taking fire from that). I'll probably have to tell the story about taking her shopping for a laptop, and getting a red one, at the next social function, just to get even. (heh)
Monday, March 17, 2008
Sunday, March 16, 2008
MySQL password reset
Putting a name to it
I learned the term "wirefu" from one of Zach Selwyn's vidcasts. Thanks guys!
Saturday, March 15, 2008
Experimental Network Sessions - Episode 5
Thursday, March 13, 2008
Realtime default extensions
Wednesday, March 12, 2008
Repair: Realtime extensions with MySQL
Sunday, March 9, 2008
Home-grown conference manager repair
For some reason, the call manager only likes channel names in the Channel variable. It doesn't like them in the Extension variable when setting up calls.
In hindsight, it's kinda obvious, no?
Saturday, March 8, 2008
Realtime extensions with MySQL
Thursday, March 6, 2008
TWUUG swag?
It's a Meridian CDNET 914 SCSI-based CD library. Good for a couple dreams but you (or at least me) don't want to be caught by your spouse, sneaking this thing in the door. (Heh) That and there's something that's just down-right creepy about having a floppy drive in the back.
Note to self: test to see if the hardware moratorium has been lifted.
Saturday, March 1, 2008
PSGw
Overall, the calls to/from Skype are of marginal quality. They're intelligable but there's enough jitter in them to be highly annoying.
I've put my PSGw notes in the wiki if anyone else wants to try it out.
Thursday, February 28, 2008
Goolag
Either one of those searches should have turned up hundreds, if not thousands of references to web cams. You can reproduce this "research" by going to Goolag and typing in "view" or "web cam" and then comparing it with a similar search via the normal Google interface (actually, Google will most likely block your search as an attempt at Google hacking, but it will report millions of hits).
Monday, February 25, 2008
VoIP Bandwidth Tester
Sunday, February 24, 2008
MPD on the NSLU2
Update: Running Icecast and MPD on the same NSLU2 may not be the best idea, at least if you're going to use the stock config files. I'm seeing almost 100% load on the box and the output to another system is quite bursty (about 3 seconds of silence for every 3 seconds of music). It's probably a good idea to put the utils on different systems (2 NSLU2s or a NSLU2 and a full-size computer?)(works nicely if I use my Asterisk service as a source). As I've built this for someone else, I don't have the resources (okay, or motivation) to tweak these.
For anyone that cares to, I will offer an account on the wiki if you'll post your tweaks.
Saturday, February 23, 2008
Icecast on the NSLU2
In short, I spent roughly four hours this morning installing various code on the NSLU2 and now have a working (I think) version of Icecast. Notes here.
If you're going to attempt the same build, it's probably a good idea to devote a Saturday to it cause it's not a simple process.
Now build MPD and write the start up scripts. I'll keep you posted.
Wednesday, February 20, 2008
Source Fource
- Can't we just buy a Happy Meal instead?
- Just how old are those guys in the marketing department anyways?
- How long before they receive an trademark infringement letter from Source Forge? (Do they think people have forgotten Mike Rowe Soft already?)
- Why is it that four of the figures on the web page appear to be actual pictures while the other three are cheesy hand drawings (including the ones for Vista and Office)? Were there delays in production?
Leverage
Tuesday, February 19, 2008
Zfone
Monday, February 18, 2008
Shmoocon 2008 - Day 3
- When Lawyers Attack! Dealing with the New Rules of Electronic Discovery (Benson)
- The Geek and the Gumshoe or Can Mathematics Solve Crimes? (Schearer, Thornton)
- PEAP: Pwned Extensible Authentication Protocol (Wright, Antoniewicz)
I left early 'cause I started feeling under the weather, nauseous on top of being tired, so I bought copies of various talks and got out of there. Good timing, too. By the time that I got back to Virginia Beach, I was down to nausea, shakes, and sweats. Haven't felt that bad since the last bout of food poisoning. Mebbe it's the flu? (No, I didn't do any of _that_ at Shmoocon. I was good.) I'm feeling somewhat better today but am definitely considering staying in bed.
Finally met CyberEagle at the SploitCast table. I'm bigger than he thought, he's younger than I thought. (Walc: I'll keep an eye out for more give-away stuff for next year.) Ran into Bob from work (shouts!). Talked with the Army cadet again.
No major surprises this year. Cisco took a beating though, with various people poking holes in VoIP implementations, network equipment, and various of their proprietary protocols.
All in all, another good conference from Shmoocon. Looking forward to seeing what 757 and the Sploitcast groups come up with for next year (this year was a bit weak in the Arcade).
Sunday, February 17, 2008
Shmoocon 2008 - Day 2
- Active 802.11 Fingerprinting: Gibberish and "Secret Handshakes" to Know Your AP (Sergey Bratus, Cory Cornelius, and Daniel Peebles)
- SIPing Your Network (Radu State, Humberto Abdelnur, and Oliver Festor)
- Passive Host Characterization (Matt Wollenweber)
- VoIP Penetration Testing: Lessons Learned (John Kindervag, John Ostrom)
- Advanced Protocol Fuzzing - What We Learned When Bringing Layer2 Logic to "SPIKE Land" (Enno Rey, Daniel Mende)
The SIP talk could have been better. They couldn't get the video for their demo to work so they had to talk about the tool they're working on, KiF (not sure what that stands for), a state fuzzer for VoIP. In some architectures, KiF can "borrow" authentication from other phones to be able to make calls.
The Passive Host Characterization was a bit dry (but still interesting). Matt is a former Trickler programmer for those that know what it is. He's posted a demo for his tool, PHC.
The VoIP Pentesting talk cetnered around some of the common configurations and shortcomings in VoIP architectures. They showed how VoIPHopper can impersonate a phone so that it can access an organization's internal network, often through the firewall (based on assumptions made during rollout of the infrastructure).
The Advanced Protocol Fuzzing talk wasn't what I thought it was going to be (Layer 2 discussions usually mean wireless) but it was interesting regardless. The group is basically working on reverse engineering and testing various Layer 2 management protocols, such as Cisco's WLCCP, using a tool called Sulley.
Here's a short view of the news/gossip from day 2:
- Ethan's walking without a cane! (For those that don't know him, he's taken a lot of ribbing for managing to generate a compound break in his leg via a Segway.)
- Rob and I got to talk with Dave Aitel and, later, with an Army Academy student (Dude, take one of our first three choices for intership! You'll get more out of it and you'll get to meet/know "interesting" people.)
- Southern Vriginia is well represented at the conference this year, having 757 (HRGeeks), Sploitcast, and Hak5 present. I managed to donate a couple items for one of Walcy's giveaways.
- Shouts to Squidly1! Who knew your offer would generate sales at the local Best Buy? (heh)
- I think hotel management finally found a couple groups that didn't "mix" badly with the Shmoocon attendees. There were actually two smaller conferences: one for "business resource managers" (salesmen) and one for Anime fans. No one really wanted to mess with the guys wearing tuxedos (they also kept to themselves) and the Anime fans were considered a bit weird by most of the geeks (though a 19-year old girl in a Sailor Moon outfit can be quite distracting). But seriously, they were wearing their costumes into the same restaurants that we were in and were making our freaks/rebels (you know, body piercings, tatoos, etc.) look normal. Most of the anime attendess just wore bunny or cat ears but some had full blown costumes which somehow were a mix of faux ancient Japanese, faux American Indian, and New York City hooker. (heh)
In any case, day 2 was fun. Got to catch up with a lot of friends that I hadn't seen since last year. I triend to hang around and particpate in the Sploitcast podcast recording but I was too tired and too hungry to stick around (my hotel is in Bethesda, MD).
Saturday, February 16, 2008
Shmoocon 2008 - Day 1
- Intercepting Mobile Phone/GSM Traffic (H1kari)
- Forensic Image Analysis for Password Recovery (David Smith)
- Baked not Fired: Performing an Unauthorized Phishing Awareness Exercise (Syn Phishus)
- Web Portals: Gateway to Information or a Hole in our Perimeter Defenses (Deral Heiland))
- Hacking the Samuri Spirit (Isaac Mathis)
"Intercepting Mobile Phone/GSM Traffic" was interesting though I got the impression that H1kari had dumbed it down to make it more interesting to a wider group. It was interesting in any case.
I felt the audience was a bit unfair at the end of David Smith's talk on password recovery. He had stated up front that it was a work-in-progress and that he was looking for other ideas. Basically his works comprises building attack dictionaries by extracting strings from memory space, passing them through qualifying filters (must be a certain length, must be from a certain (type-able) character set, etc.), and using the resulting dictionary in a much smaller brute force attack. (Rob! Something to include in the forensics class?)
Deral Heiland's talk on web portals had similar audience issues as it too was a work in progress. I guess we're an unforgiving bunch. It did remind us to pay attention to details when evaluating web services.
Isaac Mathis's talk well done (funny). It reminded me a bit of Johnny Long's talks on just about any subject. With a bit more practice, I think Isaac might just reach the same quality.
Overall, the conference is off to a good start (I wonder if there were any shenanigans last night). No suprises so far, security-wise. I ran into a few friends that I hadn't seen in awhile. Noticed that others were missing (maybe Saturday?).
Thursday, February 14, 2008
Shmoo!
Tuesday, February 12, 2008
Shrinkage
To paraphrase the television commercial: Sorry guys, I'm afraid I'm going to have to block you.
Note to self: start - 12 Feb - 392 subscriptions (now 383).
Monday, February 11, 2008
Shmoocon this week!
In any case, I'm looking forward to going. The 757 bunch will be there in force (someone said 30 of us!!?), counting those that have moved away but have remained in contact. Was there anyone that was forced to take the goon route this year?
Sunday, February 10, 2008
Xact and Yealink
Below is a capture from dmesg on the NSLU2.
input: Yealink usb-p1k as /class/input/input1
usbcore: registered new interface driver yealink
drivers/usb/input/yealink.c: Yealink phone driver:yld-20051230
usbcore: registered new interface driver snd-usb-audio
drivers/usb/input/yealink.c: urb_irq_callback - urb status -2
drivers/usb/input/yealink.c: urb_ctl_callback - usb_submit_urb failed -1
drivers/usb/input/yealink.c: urb_ctl_callback - urb status -2
drivers/usb/input/yealink.c: urb_irq_callback - urb status -2
drivers/usb/input/yealink.c: urb_ctl_callback - usb_submit_urb failed -1
drivers/usb/input/yealink.c: urb_irq_callback - urb status -2
drivers/usb/input/yealink.c: urb_ctl_callback - usb_submit_urb failed -1
drivers/usb/input/yealink.c: urb_ctl_callback - urb status -2
drivers/usb/input/yealink.c: urb_irq_callback - urb status -2
drivers/usb/input/yealink.c: unexpected response 11
drivers/usb/input/yealink.c: urb_irq_callback - urb status -2
drivers/usb/input/yealink.c: unexpected response 2
drivers/usb/input/yealink.c: unexpected response 4
drivers/usb/input/yealink.c: urb_irq_callback - usb_submit_urb failed -22
Port forwarding and SIP
Ignoring SIP proxies and external routing of calls, the immediate compromise is often forwarding a smaller number of ports and this can cause other issues if you're not careful about your server configuration.
Hint: if you only forward UDP ports 10000 through 10100, make sure to edit /etc/asterisk/rtp.conf so that "rtpstart" and "rtpend" have the same values. Otherwise, you'll often end up not being able to hear any incoming audio on SIP calls.
Friday, February 8, 2008
Firefly marathon
Monday, February 4, 2008
With apologies...
A much better approach would be to ask Rob to set up a demonstration network to show what can be done (e.g., mirroring a user's web surfing, intercepting a VoIP call, etc.). The main point is that all parties must agree to the monitoring/interception. Otherwise, it's very likely to be illegal.
Saturday, February 2, 2008
WTKR
Friday, February 1, 2008
11 Deceptive Truths We Think We Agree To
"1. Signature based desktop antivirus is an addiction, not effective security." This is one of the more offensive trolls. It's right up there with "the IDS is dead" and "the firewall is dead". Statements like this make sweeping assumptions about what you're trying to protect and what tools you're using to protect those assets. Sadly, signature-based anti-virus actually has the best ROI.
"2. The bad guys beat us because they're agnostic and we're religious. Complete and utter BS. The bad guys are in the lead because they're doing the majority of the research. It's a bad analogy to start because if the good guys were to ever "win", every bad guy would be either dead or in jail. Mebbe it's better to call it the "game of life"?
"3. Antitrust concerns force Microsoft to weaken security." Hahahahahahahahahahahahahahahahahahahahahahahahahaha...!!! Yeah, keep believing that Microsoft would give something away for free if they hadn't been sued in the past. Troll!!
"4. Vendors are like politicians - they lie to use because we ask them to." Wow. Uh, can I sell you something? Troll!
"5. We're terrible at talking to, or understanding, those that fund us." Uh, speak for yourself. Obviously, a good chunk of us understand "business-eese". Otherwise, the "industry" would have died of atrophy years ago.
"6. Security researchers need to grow up." Obviously Mr. Mogull has never seen someone else's name tacked onto his work, had his work denigrated in mainstream press, or was ever under attack from an organization that refused to believe that their product was ever anything other than perfectly secure. Troll!
"7. Security companies make more money when there are more incidents." True somewhat. However, Mr. Mogull seems to have missed the mark by claiming that the fastest way to grow a security market is to have a product ready when a massive exploit hits. It's a fallacy. The actual fastest way is to have a good marketing plan ready for when the next big exploit hits. You can go a lot further with a superb marketing plan and a crappy product than you can with a superb product and a crappy marketing plan. The day the day-stopping painful exploit occurs is when the lawyers make the most money. Followed by vendors as companies abandon certain products for others, followed by insurance companies as companies attempt to transfer the risk (look it up in your CISSP books) of future exploits. The security companies are somwhere after that.
"8. Network security is the result of a mistake, not an industry worth perpetuating." Either a troll or a cry for help. Network security is a need arising out of the fact that your company has a competitor. Ideally, life would be serene and no one would feel the need to steal your secrets. In the real world, someone sees some sort of profit (financial, emotional, relational) in breaking into your systems and changing something. Mr. Mogull's argument only holds water if you believe that somewhere out there, utopie exists.
"9. Disclosure is dead." WTF?!! Given their druthers, companies don't disclose sh#t. This is a massive troll that suffers from the wide-ranging, yet slowly moving pendulum of "accepted practice". Hint: a number of recent laws now require "disclosure" yet there's been a number of law suits which have forced limited disclosure of vulnerabilities and exploits.
"10. Momentum will destroy us, until it doesn't." Uh, huh? Innovation is a marketing practice. Operationalization is a marketing term (okay, vague rationalization for an irrational decision). The entire paragraph is basically a gripe that neither our employers nor the bad guys have remained static. Whiney troll!
"11. We can't fail." Mebbe as a whole. However, individual security companies fail often. They sometimes "take their customers with them". Just as the bad guys will never "win the war" (face it, it isn't a "war" where people die from every port scan), neither will the good guys. A much better analogy is to view it as a competion, where your goal is to "keep up".
Wednesday, January 30, 2008
Borked EPG
Sunday, January 27, 2008
Asterisk and overhead paging
Wednesday, January 23, 2008
Shmoocon speakers
Monday, January 21, 2008
A box of crap
Needless to say, I've "recovered" parts (power supplies, cables, mounting screws) from a number of VoIP devices for which the manufacturer is absolutely rabid about service payments (i.e., the devices are in the trash but I've a ready store of the usual these-break-first parts).
Now's all I need is the time to desolder a number of connectors. Where'd I put that solder sucker?
I also need to worry about the hardware moratorium. My wife has been quietly watching all of this movement and hasn't said a thing. Mebbe she's just wating to see how much actually "stays". (I also did promise to sort through my old stuff and toss out various bits.) I hope to have my workbench (my desk) cleared off by Easter.
Sunday, January 20, 2008
Level 9
See? The writers' strike does have some nice side effects...
Saturday, January 19, 2008
Friday, January 18, 2008
Skype and VoIP interoperability, please!
Thursday, January 17, 2008
Chanalyzer 3.0
It may also be worthwhile to note that they released Inssider 1.0.6 a couple weeks ago and the Linux tools ihave been tweaked, also (not by MetaGeek).
Tuesday, January 15, 2008
OLPC Mesh
FUDCon 2008 notes
Both Sparks and I suffered from Bill Gates Syndrome in that I could not get F8 to recognize my CDROM drive and Sparks wireless wouldn't cooperate. His problem was surprising as it's both a recent system and a recent wireless card (which worked when we tested it in Virginia). My issue wasn't that surprising as the laptop a Sony that's over five years old. Getting a distro up and running on it, when it was brand new, was a headache and a half.
Luckily, I had the N800 with me. I was able to visit some of the sites that were talked about and I managed to grab a few photos (I'll post them when I have the change to sort through them). I think that, next time, we'll spend the weekend before building/testing systems, vice on-the-fly.
All in all, it was a good time. We sat in on a few of the talks. FedoraTV, open source GIS, and Asterisk were memorable. When we first got there, I fired up Kismet on the N800 to see what was available (RedHat provided a wireless connection). To our suprise, we detected 5 OLPC computers. We didn't see them at first but did get to touch one of three later in the day. (Hint: they show up as ad-hoc probes for "olpc-mesh".)
The one sour note of the evening (which irks me more and more as I think about it) was a particularly rude comment by Jared Smith, at the end of his talk. He'd given a copy of his book, "Asterisk: The Future of Telephone," to a young woman sitting in the row in front of me. She was actually quite happy to have received it. I suggested that she get Jared to autograph it, which she did. As I was leaving, I overheard him say something along the lines of "How would you like it signed? Best of luck to my favorite E-Bay bidder?"
Grr... What an ass ego ass!
(Note to Jared: Some people cherish their autographed books. I have a number of them, even some published by O'Reilly. Besides, you aren't worth that much.)
Regardless of one poorly thought out comment, I highly recommend FUDCon and BarCamp. Even if you only learn one or two new things while attending, you get to meet people from various circles and you'll probably pick up a few new ideas about some of the programs you've been using for years. Heck, you might even end up talking about one of your passions.
Monday, January 14, 2008
Changing the SageTV web port
Thursday, January 10, 2008
Too much detail
The store had the latest Harry Potter DVD in the drive. It had cycled around to where it was waiting for someone to push "Play". No central graphic. Just three columns of credits and disclaimers, with the "Play" button in the border at the bottom of the screen.
Blech!
Wednesday, January 9, 2008
Your children are in danger!
With this article, I'd much rather see people "be annoyed, be very annoyed!"
Monday, January 7, 2008
Blog claim
Installing CDR
Sunday, January 6, 2008
FUDCon 2008
In any case, it looks interesting (this will be my first un-con of this type). I'll keep you posted.
Wednesday, January 2, 2008
Cheap Trick
Tuesday, January 1, 2008
Conference call
What do you think? Something like a couple unstructured hours on a Saturday afternoon/evening?