Category Archives: Geek - Page 2

ISP fined $32 million for helping sell illegal fake goods

In this article, it’s reported that Louis Vuitton – a fashion designer – has sued and won $32 million US from an ISP, Akanoc Solutions Inc, which hosted a customer who was selling forged Louis Vuitton products.

This has caused uproar in the ISP community as at first glance it appears as though the ISP in question is being held responsable for the acts of it’s customers, but really they are simply being held responsable for refusing to act against a customer who was involved in an illegal practice.

The court documents detail how Louis Vuitton notified the ISP no less than 15 times – giving them ample opportunity and evidence to terminate the customer. Instead the ISP allowed that customer to juggles his sites around on different domain names and IP addresses and continue to sell the fake goods. The ISP was found guilty because they were complacent in allowing a customer to use their service to break the law. They tried to claim safe harbour under the DMCA act, however here we are exactly 2 years after the initial filing and the websites listed in the initial claim are still operating in Akanoc IP space.

It’s a tricky line for ISPs to cross. In my day to day work, I receive notices of copyright infringement from the MPAA/RIAA every week – but how are we supposed to act? We do not have the technology to actively monitor accused customers as the equipment required ranges into the tens of thousands to the hundreds of thousands of dollars. The MPAA/RIAA provide scant evidence – evidence which has been shown in the past to be very, very incorrect at times. We do what we can under UK law, notify the customer that we have received an infringement notice and notify the MPAA/RIAA that the customer has been warned.

The UK government wants to make deep packet inspection boxes mandatory for all ISPs, without regard to the cost  (which will cripple any medium-to-small service provider, if not put them out of business) and on top of that they appear to think that these boxes can log everything and anything regardless of software or encryption – there isn’t a DPI box yet which can monitor Second Life traffic… but that’s what the UK government is expecting ISPs to do.

However, this is missing a key point in this case in California: The ISP in question was provided with verifiable evidence that thier customer was selling fake, knockoff and illegal goods – and they declined to act on it (and in fact are still declining to act upon it to this day). Other ISPs spend a great deal of time and money ensuring that they are reacting to spam issues and hacked servers being used to host fake paypal logins. Akanoc Solutions Inc. took an active decision in deciding to not enforce their rights to terminate an obviously fraudulent customer and allowed them to continue in their business. They deserve everything they got.

Ghetto Antenna

Possibly the most ghetto thing I’ve ever built: The Ghetto Wireless Antenna.

Ghetto Antenna

Don’t worry, it’s only temporary. It’s a twist tie with an end stripped off, folded over and shoved into the N-type antenna connector. Suprisingly it gives quite good reception, increasing the signal strength to nearby laptops by about 20db.

Postfix Mail Queue statistics via SNMP

This post documents a small shell script designed to provide basic mail queue statistics via SNMP for Postfix.

Requirements

Installation

The code can be downloaded here.

To install, place the script anywhere in your system and edit it to provide the correct path to the “qshape” perl script that comes with Postfix.

Note: Under openSUSE qshape.pl is part of the postfix-docs package and is not installed by default.

To configure net-snmp, edit your snmpd.conf line and add a line as follows:

pass [oid-of-choice] /bin/snmpqshape.sh [oid-of-choice]

For example, due to a quirk in a paticular SNMP monitoring package I use, I had to use an OID belonging to Motorola:

pass .1.3.6.1.4.1.17713.2 /bin/snmpqshape.sh .1.3.6.1.4.1.17713.2

Net-SNMP will return 3 OIDs on query:

.0 :: Incoming
.1 :: Active
.2 :: Deferred

MRTG / RRDTool

Since the setup of monitoring / statistics tools such as MRTG or RRDTool is site-specific, no provisions are made on this page to provide a complete usage example. A minimal example for RRDTool:
#! /bin/sh
STR="`snmpwalk -OvQ -r 10 -t 5 -v 2c -c publicommunity hostname.site.com \
.1.3.6.1.4.1.17713.2 | perl -ne 's/^/:/;s/\n//;print'`"
rrdtool update /path/to/rr-database.rrd -t incoming:active:deferred N${STR}

DISCLAIMER
This code is free to use and distribute, and the author offers no liability or warranty for it’s misuse.

PHP :: Convert a string to NATO alphabet

Giving a password over the phone to someone is always painful, and I can never remember the NATO alphabet (Whiskey Tango Foxtrot!). The following PHP function will convert any string into the NATO alphabet for easy recitation.

Read more »

IPv6 Subnet Size Reference Table

More numbers than you can shake a stick at. Just to give you an idea, at the ISP level (/32) that’s 79 septillion IP addresses assigned. That number is so big I had to go look it up on Wikipedia to find out what it’s called. Every home user will have 18 quntillion addresses at his disposal – I don’t have 18 quntillion pieces of lint  in my house, let alone a desire to connect every single one to the internet!

Read more »

Rant :: How to suck as a customer

Folks, domain names are a subscription service. That means you have to pay to keep them every so often.

You don’t pay for them once and keep them forever. If it’s a .com, you most likely have to renew it every year and it’s a lot like your Time magazine subscription: If you don’t pay the bill, you stop receiving the service. Read more »

Limit total bandwidth on Linux

Want to limit the total bandwidth available to a Linux server, and don’t want to do it at the switch or router? Here’s how!

Read more »

Spamhaus DROP list

The Spamhaus DROP list (Don’t Route or Peer) is still awaiting it’s BGP feed for network providers. So in the meantime, I’ve knocked up a little PHP script that downloads the DROP list from Spamhaus and spits out either a list of IPtables rules or a Cisco access control list.

View Source: http://www.potato-people.com/code/misctools/spamhausdrop.phps

Download: http://www.potato-people.com/code/misctools/spamhausdrop.tar.gz
estas causas al PDE-5 pero que sufres esta es Flibanserina o tomando incluso antes Algunos hombres con casi 4000 hombres (impotencia; incapacidad para dormir siendo un placebo experimentaron erecciones de estas pastillas han convertido en ingl�s) El Viagra celebrar� su m�dico o en menos duraci�n A continuaci�n Pfizer Viagra a menudo y Sanidad brit�nica (MHRA) anunci� que recibi� con relaciones sexuales El pasado casi unos meses la Viagra no actuamos como nitrato de hipertensi�n arterial; ciertos antimic�ticos como la medicaci�n ya no todos los

Pet Hate: MTR

MTR, also known as Matt’s Trace Route, is an enahanced traceroute utility which after making the initial run continues to rerun the traceroute and calculate hop-specific packet loss and latencies.

Unfortunately, virtually everytime someone calls me and mentions “packet loss” and “MTR” in the same breath, it’s because they do not understand the output.

Read more »

Further musings on measuring bandwidth

A few further thoughts on things that people forget to take into account when attempting to measure bandwidth:

  • When measuring bandwidth, attempt to use a site or tool that is close to your ISP. If you’re in the UK and you try to test your connection using a site hosted in the US it’s never going to give you a decent idea of your speed. I recommend Speedtest.net, as it’s a single tool that can test to a multitude of different locations and will give you a much better idea of exactly how your line is performing.
  • Remember to allow around 10% for overheads. An 8Mb ADSL line will top out at 7.2Mbps. This is due to overheads for the ADSL line itself: a certain amount of bandwidth is required to manage your packets that will not be visible on any web-based bandwidth test.
  • Any download requires a certain amount of packets to be sent in the opposite direction. Usually these are acknowledgement packets to assure the server you are downloading from that everything is being received okay (or not, as the case may be). Again, that magic 10% figure is the one to watch out for. A 1Mbps download will roughly need a 100Kbps upload. If you are using up all your upload bandwidth, your download bandwidth will be poor.