Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment Re:why is this release announcement buried? (Score 1) 124

Facebook, Microsoft, Amazon, Apple and Oracle all have a whole lot more users than NetBSD. To most people, NetBSD brings absolutely nothing that Linux doesn't bring. NetBSD may run in some routers, but Linux probably runs in a *lot* more routers. Even FreeBSD may run in more routers than NetBSD (JunOS is FreeBSD based..).

So, to most of us, NetBSD is "meh, don't care". Sorry.

Comment Apple (Score 1) 460

Apple is heading fast into the direction Microsoft went in the nineties. Even today news came out that Apple spends more on patents than on R&D. Now my question: what are your feelings towards Linux developers and users buying Apple hardware in order to run Linux on it? Do you feel they are in a way approving the way Apple operates nowadays?

Comment Re:Linkgin'2WP = infringement (Score 2) 203

No it isn't. Wikipedia was known by the general public before you linked them from your comment. Furthermore, the content on wikipedia isn't infringing.

I've got copies of music available on my private server at home. That server can be reached from the internet. If you'd somehow found out the url of the copied songs, then you'd be publishing (i.e. making them known to the general public) them, which would be infringing. And my personal copies are legal since I'm allowed to make a private copy of music I own.

Comment Re:Security by obcurity? (Score 4, Interesting) 203

Copyright law protects Security By Obscurity. So the judge was correct in this case.

In order in infringe on copyright law, you'll have to make a copied work public. So, as long as you don't publish a copied work (i.e. keeping it obscure), it's not an infringement. This, for instance, allows you to make a private copy of a copyrighted work without infringing on copyright law.

In this case, a private copy was made. Nobody knew where to find the copy, except for the person who placed the copy online. So, while the copy was on the internet, it wasn't public. Geenstijl made the copy public by making the URL known to the general public. Therefore Geenstijl infringed on dutch copyright law.

Comment Re:Seasons are tied to the equinoxes and solstices (Score 1) 454

Most of modern science started in western europe. Weather in western europe is dependent mostly on the temperature of the atlantic ocean. At the summer solstice, warmup of the ocean is at its quickest, but the temperature is still rising. It will continue to rise up until august or so. Therefore august is the hottest month in western europe and therefore seasons are defined as they are.

Somehow those late medieval scientists didn't care much about other regions of the world. Sue them.

Comment Re:So they don't know... (Score 1) 177

Any competent CA uses an HSM. I can even imagine using an HSM is a requirement for inclusion into the default CA bundle in webbrowsers.

An HSM is a Hardware Signing Module. It's a piece of hardware (supported by OpenSSL, by the way) which holds the secret keys. Secret keys cannot possibly be copied out of the HSM, except for backup purposes. But the backups are encrypted within the HSM itself, so the backed up keys can't be used for signing.

Diginotar, as most CA's I know of, uses multiple secret keys. One key is used for automated signing, typically used with Domain Validated certificates (blue address bar in your browser). For this key, a passphrase is kept somewhere available for the automated process, which of course is unsafe. Another key is used for higher security certificates. This is why not all certificates issued by diginotar are untrusted now. The certificates used by the Dutch governement for example, are signed with another key than the compromised key used for *.google.com.

So, nobody got hold of the private key -- it's safely in the HSM. Not all of Diginotar is untrusted, just the key used for signing *.google.com. Removing Diginotar entirely from browsers is a bit of an overreaction. It also causes distrust of certificates not signed by the key used for *.google.com. This includes the central Dutch identity service, DigiD. DigiD is used for authenticated the inhabitants of the Netherlands to websites operated by the governement, so removing the entirety of Diginotar from browsers has a very large and unintended side effect.

Comment I disagree (Score 1) 173

At some point, connection quality on IPv4 will be worse than connection quality on IPv6 for a significant amount of people. Their CGNAT may be overloaded. They may run applications which don't work correctly behind CGNAT.

When this point is reached, dual stacked hosting will be an advantage over IPv4-only hosting. Search engines may start to weigh in IPv6-reachablilty of sites. When this happens, you'll want to be with a hoster which supports IPv6 already.

Comment Re:Dual Stacks..... forever... (Score 1) 321

I don't think the first push to IPv6 will be on the web. I think I'll be on peer to peer protocols and gaming. People soon will start to notice that carrier grade nat will work mostly fine to connect to webservers. However, they'll also notice their VoIP will suck. The connection to the game server will lag on IPv4 via NAT.

To webservers, they'll notice they can't post to any popular bulletin boards. The external CGNAT IP is likely to be banned from posting due to some other customer on the same CGNAT posting abusive messages. They may not be able to submit their mail to their favorite SMTP server because of a DNSBL.

So, they'll want IPv6 to avoid the GCNAT. IPv6 to them will be the superior solution to connect to specific services on the internet. So, I think this will start the snowball effect. When more and more users are demanding IPv6 servers due to the limited CGNAT they're behind, more and more server operators will think the transition to IPv6 will be worthwhile.

So yes, we'll be on dual stack for a while. But the IPv6 internet will soon be superior due to CGNAT being cumbersome to the end user.

Comment Re:Not much to do (Score 1) 459

Yes, port 587. This is the port authenticated clients can connect to (eg not spammers). So, run your mailserver externally with port 25 incoming and outgoing unblocked. From behind a line with port 25 outgoing blocked, you connect to this server using port 587 and smtp auth. Problem solved.

The OP can also solve his problem easily and cheaply by using comcast's outgoing smtp servers as smarthost.

Comment Re:IPv6 of course (Score 1) 320

I am in the business and I'm investing in IPv6-capable hardware, converting websites to support IPv6 (for instance when storing remote IPs from visitors), etc. All these things cost real money for no real immediate gain. We're going to use it as a marketing instrument to try and gain an advantage over competitors and when the real IPv4-crunch is there, we'll be ready.

I'm not trying to make money off you. And that's exactly what's the difficulty charging for IPs: who's getting the money? And what are they going to do with it?

Either way, 2011-2012 is going to be a very interesting couple of years.

Comment Re:IPv6 of course (Score 1) 320

The sollution is to put a price on IPv4 blocks. And make them increasingly expensive. Currenty there's NO economic insentive to upgrade to IPv6 because IPv4 is free and IPv6 for all practical purposes costs money (because of investments in routers, training, time to set up, etc).

Demanding IPv4 address space is free has been the biggest mistake in the transition to IPv6. Now it only can be fixed by a very rapid rise in price which is undesireable.

Comment Re:Dual stack failed? (Score 1) 320

ISPs are issued /32's. They subdivide it to their customers as /48's who can divide it up to /64's for individual lans. That's right. Even a tunnel holding 2 devices is usually issued a /64 which will waste 2^64-4 addresses.

Since a RIR is issued a /16, we can have:

64K RIRs (we have 6) (some /16s are reserved)
64K large ISPs per RIR (or the RIR can just add another /16 to their pool)
64K large customers per ISP
64K networks per large customer

Note that an access provider (ADSL, cable) can divide their individual customers up in 64K * 64K networks.

So, while IPv6 brings a whole lot more allocatable space than IPv4, in practice it's a lot less than 2^128 addresses because of a lot of waste in the addressing space.

Slashdot Top Deals

"Gravitation cannot be held responsible for people falling in love." -- Albert Einstein

Working...