Sen. Hoyle’s anti-municipal broadband bill up for vote today

Sen. David Hoyle (D-Gaston)

Senator David Hoyle (D-Gaston) managed to get S.1209, his anti-competition broadband bill, scheduled for a Senate floor vote today after ramming it through the Senate Finance Committee yesterday. Though committee senators Joe Sam Queen,, William Purcell,, and Floyd McKissick were questioning the wisdom of the bill, Daniel Clodfelter called opposition to it “noise” and Hoyle openly rolled his eyes as Purcell explained that this bill will leave rural communities broadband wastelands. Presiding senator Clark Jenkins then cut off debate and quickly called for a vote, declaring it passed before anyone could object. Just when I thought I’ve seen stunning behavior in the North Carolina General Assembly something comes along that stuns me even more. There wasn’t one vote against this bill and plenty of lies told by Hoyle in support of it.

Hoyle also managed to put in an exemption for Google Fiber, though he clearly couldn’t explain what it was. This is the problem with me: when lawmakers regulate things they clearly don’t understand the result is bad law. The only experts Hoyle apparently consulted were the ones with checkbooks in their hands.

People tell me the days of back-room politics will soon be over but they’re apparently still alive and well. Hoyle can’t leave office fast enough for me. His idea of this being a “business-friendly” state means big business wins and citizens lose.

You can hear audio of yesterday’s meeting here.

IBM BladeCenter voodoo

I’ve been working with computers practically all my life and thought I’d seen it all, but this one really surprised me!

At $WORK we have a number of IBM BladeCenters hosting our VMWare environment. Each blade chassis has 14 IBM HS21 bladeservers in it, and the way the environment is designed to scale everything has to be identical. Well, my department needed to take a blade chassis out of this identical environment and repurpose it for another project.

The plan was to install Red Hat Enterprise 4 on these servers using a PXE kickstart process. On other blades and equipment this would go off without a hitch. For some reason, though, these particular blades caused a kernel panic right when the Linux kernel would load. Turning off acpi didn’t seem to help. That Red Hat 5 would load on these same systems made us even more puzzled.

Finally, one of the night shift UNIX gurus had the solution, which was provided years ago by our IBM vendor. Their solution? To swap the CPUs on each motherboard! Our team dutifully did this and somehow each blade successfully booted Linux.

I about fell out of my chair when I heard that this worked. It makes no sense whatsoever but somehow it worked.

Just when I thought I’d seen everything . . .

System administration by the book

I browsed the computer book section of my local Borders this weekend, looking for something that might make me a better system administrator. Among all the books for applications ranging from web tools, programming languages, and others there was a noticeable lack of books showing how to manage the systems that run these applications. The only book I saw that came close to this was a book devoted to Ubuntu server administration.

Good system administration does not come by accident, it comes by many accidents! It takes years of experience dealing with the headaches that computers can cause before one finds their sysadmin sweet spot. While it takes most of us many years to gain that knowledge, it would be nice if a few books were available that would condense this hard-earned wisdom into helpful advice, independent of the actual platforms involved (bookstores seem to love to group their books based on a popular, high-profile name. System administration, as a concept and philosophy, does not lend itself to this kind of packaging).
Continue reading

The compelled certificate creation attack

My friend Jeff has alerted me to a large hole in the SSL encryption problem: that of the compelled certificate creation attack.

Here’s how it works: your web browser comes pre-programmed to trust a number of certificate authorities. A certificate authority is an organization which vouches for an SSL-certificate being presented by a website. An SSL-certificate is designed to positively identify that a website you’re connecting to is who it says it is.

A national government intent on spying could compel one of these certificate authorities (call it ABC Certificates) to create an imposter SSL certificate (for, say, bankofamerica.com) and bless it with ABC Certificates’s stamp of approval. Because your browser trusts ABC Certificates, it will happily trust this fake certificate from bankofamerica.com. The evil national government could then surreptitiously intercept all traffic bound for the real bankofamerica.com and point it to its fake website so as to collect information. Or, it could surreptitiously insert a proxy into the SSL data stream and capture packets, with you or your browser being none the wiser.

You can read the findings of the two Indiana University researchers, Christopher Soghoian and Sid Stamm, here [PDF] on Cryptome.Org. You can also read the discussion of the vulnerability here (scroll to lower 2/3rds of the transcript).

Farmville maker raking in the cash

We were in Borders today chatting with one of the staffers. Somehow the conversation veered to Facebook, when mentioned an amazing statistic about the service. He told us the company that makes the (addicting or annoying, depending on your point of view) games Farmville and Mafia Wars on Facebook is on track to make $450 million this year, selling non-existent livestock and guns.

Sure enough, Business Week has the scoop on this three-year-old company named Zynga. Now where can I find a book on the Facebook API?

Google fights Gmail hackers

Yesterday I received a strange email sent to a neighborhood list by a neighbor. The subject was “Modesty Marquita” (which sounds like a stripper name, actually) and all that was in the body of the message was a URL to a webserver in Brazil. I searched the web for any references to either of these items and didn’t turn up anything unusual, so I wrote it off.

This evening made me change my mind, however. Another friend (Let’s call her Anne) sent out four similar emails. Same M.O.: a random person’s name in the subject line and a web URL in the body. That’s when I figured out something is not right in Gmail land.

The kicker was this message below (I’ve changed account data). This message was sent from one Gmail account to another one: in other words it never left Google’s network:
Continue reading

Court rules against FCC in Net Neutrality case

A federal appeals court ruled today that the FCC lacks the authority to enforce Net Neutrality in a case against Comcast.

“This decision destroys the F.C.C.’s authority to build broadband policy on the legal theory established by the Bush administration,” said Ben Scott, the policy director for Free Press, a nonprofit organization that advocates for broad media ownership and access.

Continue reading

Chinese hacking: the Shadow network

This morning’s paper told of a massive cyber-espionage network being uncovered, with most of it leading back to China. The report, called Shadows in the Cloud: An investigation into cyber espionage 2.0 is quite revealing:

Complex cyber espionage network – Documented evidence of a cyber espionage network that compromised government, business, and academic computer systems in India, the Office of the Dalai Lama, and the United Nations. Numerous other institutions, including the Embassy of Pakistan in the United States, were also compromised. Some of these institutions can be positively identified, while others cannot.

Theft of classified and sensitive documents – Recovery and analysis of exfiltrated data, including one document that appears to be encrypted diplomatic correspondence, two documents marked “SECRET”, six as “RESTRICTED”, and five as “CONFIDENTIAL”.

Evidence of Collateral Compromise – A portion of the recovered data included visa applications submitted to Indian diplomatic missions in Afghanistan.

Command-and-control infrastructure that leverages cloud-based social media services – Documentation of a complex and tiered command and control infrastructure, designed to maintain persistence. The infrastructure made use of freely available social media systems that include Twitter, Google Groups, Blogspot, Baidu Blogs, blog.com and Yahoo! Mail.

Links to Chinese hacking community – Evidence of links between the Shadow network and two individuals living in Chengdu, PRC to the underground hacking community in the PRC.

Read more of the report here.

Google Fiber: what happens next

Google’s James Kelly, Product Manager for their Google 1Gbps Internet project, talks about where they go from here.

So what’s next? Over the coming months, we’ll be reviewing the responses to determine where to build. As we narrow down our choices, we’ll be conducting site visits, meeting with local officials and consulting with third-party organizations. Based on a rigorous review of the data, we will announce our target community or communities by the end of the year.

So, it’s all in The Goog’s hands, at this point. I’m hoping the City of Raleigh makes the cut, in spite of the less-than-motivating city effort.

Previously:
Raleigh works to woo Google Fiber.
Gaga for Google’s fiber – Independent Weekly

Google Fiber in WaPo

The announcement today of Google Fiber to the home was covered in today’s Washington Post:

The company said it will build fiber-to-the-home connections to a small number of locations across the country that will deliver Internet access speeds of 1 gigabit per second. It will take bids from municipalities beginning through late March to determine what areas would be part of its experiment. Google said access prices for consumers would competitive and that its network would reach at least 50,000 and potentially up to 500,000 people. A source who spoke on the condition of anonymity said the company doesn’t currently have plans to expand beyond the initial tests but will evaluate as the tests progress.

Having one’s city wired for blazing-fast Internet access would be a huge shot in the arm for a municipality. I sure hope it comes to Raleigh!