Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror

Comment: Re:Tried IPv6 (Score 1) 382

by marka63 (#49525061) Attached to: Why the Journey To IPv6 Is Still the Road Less Traveled

The average user will notice the lack of IPv6 when a CGN is put in the IPv4 path and things like port forwarding stop working. For some ISP's that is now. For others it is in the future. Until then you really shouldn't notice whether you are using IPv4 or IPv6 to reach another site or how you are reached. If you do notice then the ISP / OS vendor isn't doing their job properly.

Hopefully the ISP will take away the IPv6 knob and just deliver IPv6 to everyone in the near future. There aren't many IPv6 only reachable destinations yet but more are coming as more ISP's switch over to using CGN to deliver IPv4.

Comment: Re:What about the online use of these cards? (Score 1) 449

by marka63 (#49084355) Attached to: Credit Card Fraud Could Peak In 2015 As the US Moves To EMV

It a combination of things. Sure you can photocopy a card if you can get access to it for long enough but
requiring a pin forces the customer to go to the card reader or the card reader to be brought to you. This
reduces the window when the card can be photocopied or the magstrip being fraudulently read. Add to
that the CC# is tagged as requiring a pin so you can't just put the details onto a blank and use it.

Online transactions still need the CCV.

No security is perfect.

Comment: Re:goto fail; (Score 1) 677

by marka63 (#49043077) Attached to: Empirical Study On How C Devs Use Goto In Practice Says "Not Harmful"

Are you saying that you would have caught the error if it was "return err;" instead of "goto fail;"?
Do you want to ban "return" next?

int err;
if ((err = PrepareHash(x,n)) != 0)
        return err;
        return err;
if ((err = CalculateHash(x,n)) != 0)
        return err;
return CompleteHash(x,n);

In both cases there is code that is unreachable and a good dead code analysis will catch it.

Comment: Re:Good ... (Score 1) 103

by marka63 (#49002679) Attached to: Bipartisan Bill Would Mandate Warrant To Search Emails

Actually you often had a email account and logged in and read it using a command line interface and yes email was left in the mail box.

After that came POP and IMAP, both of which supported leaving email on the server. The main reason for down loading was the ridiculously small amounts of email storage space offered.

The entire premise that email over a certain number of days is abandoned was always false.

Comment: Re:$28 million is a lot! (Score 1) 204

I just replaced a cable modem that was 10+ years old. I've got other equipment that is still going strong after 15 years. The only thing that was done, other than the occasional clean out of dust, was to replace a single fan. So yes, 20 years should be possible and if not the replacement costs of the powered equipment is a lot less than the full cost of installation. Replacing a CPE device will be less than $100 and will most probably support a faster connection speed. Replacing a line card will be similar on a per port basis. The fibre will last 20 years without a worry. The major problems with fibre will be back hoes and if the plastic sheath attracts animals.

Comment: Re:better than in Australia (Score 3, Interesting) 204

The act is "Broadband Network Companies Act 2011" so you can't really blame it for the ageing infrastructure. If you want to blame anyone for the ageing infrastructure blame the ISP's that failed to invest in new technologies.

This two decade old paper shows Telstra's plans for FTTH in 1994 INT94b.PDF. Telstra failed to act on this for two decades. The introduction of the NBN is a reaction to that failure to act and a recognition that the costs are such that you needed a longer term outlook than next quarter's earnings. The NBN also got caught up in partisan politics which hasn't helped.

Comment: Re:They're assholes. (Score 1) 336

by marka63 (#48677461) Attached to: Why Lizard Squad Took Down PSN and Xbox Live On Christmas Day

As a Industry there is lots one can do to prevent / reduce a DoS.

You can quarantine infected machines.
You can install BCP 38 filters so traceback is more effective.
You can ensure that fixed software images are always available.
You can not orphan software just because it is old.
You can auto update software.

You can take pro-active steps like surveying the your customers and informing them when they have a known vulnerable system.

Comment: Re:DNSSEC (Score 1) 110

by marka63 (#48629249) Attached to: Hackers Compromise ICANN, Access Zone File Data System

For the root zone there is very little that is actually signed as most of the root zone is delegating NS records (not signed just their presence in the NSEC record is signed) and glue address records (not signed). If you can alter the root zone contents you can introduce new DS records matching DNSKEY records you control. These would then get signed and if you can direct your targets to this alternate version of the TLD it will be accepted as valid. This will only work until the zone signing key is rolled at which stage the DNSSEC validation chain will no longer work and you will need to go back and get the DS re-signed. Actually changing the root zone contents like this will almost certainly be caught as it is a highly examined zone. In particular people checking DS/DNSKEY pairs looking for errors so they can be fixed quickly. Now if you can get someone to sign a isolated DS RRset that is not in the root zone but is for a TLD then this could go undetected for longer but that is a much harder problem than just changing the root zone contents. That still only has a limited lifetime as the RRSIGs need to be refreshed.

The signing ceremony is where the DNSKEY RRset is re-signed to introduce / remove zone signing keys. The private part of the zone signing key has to be available on a day to day basis for the normal day to day changes in the root zone. That said the private part is still held in a HSM and the worst that can happen is that someone can get some data signed which can be used until the zone signing key is rolled.

Comment: Re:I'm fine with a fine (Score 1) 179

$monthly * (throttled time / time in month) * 10.

The 10 times multiplier is a penalty. This is applied to all months for which the customer held a unlimited plan.

If AT&T don't have the data for when the plan was throttled the assumption should be that the plan was being throttled all the time.

It should also be a cheque not a credit.

Comment: Re:Easy to solve - calibrate them to overestimate (Score 1) 398

by marka63 (#48198711) Attached to: Speed Cameras In Chicago Earn $50M Less Than Expected

The smart thing is to make all the cameras speed and red light camera. Prominently display where such camera are installed. Traffic will get used to this.

Where I live most of the red light cameras have been converted to safety cameras (red light + speed) and you will go through lots of intersections with them. This brings the speed down between cameras as well as reducing the number of accidents at intersections. Traffic actually travels within the speed limit instead of the +10 I often see on US roads.

Science and religion are in full accord but science and faith are in complete discord.

Working...