irclog2html for #uphpu on 20050119

00:00.56optikalbbiab.. heading home
00:01.03beandogDo you work at Linux Networx?
00:01.20macnewboldoh, were you talking to me? no, I don't work there
00:02.15macnewboldwe do have some members who work there though, which is how we got to use the building
00:02.23wps_had_
00:02.41wpshe moved
00:02.44macnewbolddoh
00:02.49macnewboldso how are we still doing it there?
00:03.03wpstwo other employees like us though and were willing to support us
00:03.10macnewboldoh, good :)
00:04.59tierra|wI better head out from Bountiful... not sure what traffic is going to be like...
00:06.39beandogso where do we go once we reach the building anyway
00:06.42beandogare there gonna be signs?
00:06.46beandog"donuts this way"
00:07.16wpsthe room is right on the outside wall of the building and has large windows
00:07.24wpsyou can see everyone when you pull up
00:07.55beandogok coo
00:16.28macnewboldokay, last chance for a quick vote: all in favor of donuts, say "aye"
00:17.27dataw0lfaye.
00:17.45wpsaye
00:18.15fungusaye
00:18.44macnewboldlooks like they aye's have it
00:18.54macnewboldhow many do we need, wps?
00:19.09wpsit's a really hard call, as we never know how many are coming
00:19.10macnewboldtwo dozen enough, you think?
00:19.22wpsyes
00:19.25macnewboldk
00:19.46macnewboldhopefully the five of us in my car won't make too many disappear before we arrive :)
00:20.59macnewboldk, dataw0lf rides in the back, and the donuts ride in the front
00:20.59macnewboldhehe
00:20.59dataw0lfhehe
00:25.04*** part/#uphpu fungus (~fungus@firebat.aros.net)
00:27.08beandogaye
00:27.25beandogIf I had more than $2 in my bank acct, Id bring some myself.
01:06.13*** join/#uphpu optikal (~optikal@c-24-10-198-60.client.comcast.net)
02:00.23*** join/#uphpu usynic (~synic@c-67-172-242-219.client.comcast.net) [NETSPLIT VICTIM]
02:04.48*** join/#uphpu wps (~wps@66.239.25.55.ptr.us.xo.net)
02:04.51*** mode/#uphpu [+o wps] by ChanServ
02:17.16*** topic/#uphpu by wps -> Meeting underway... you're missing the donuts
04:26.12*** join/#uphpu tierra|h (tierra@c-67-166-119-150.client.comcast.net)
04:49.20dataw0lfNice meeting gentlemen.
04:49.28dataw0lfExcellent presentation macnewbold.
04:49.33dataw0lfNow, time to watch the Shining.
04:53.07*** join/#uphpu spiderbiter (~spiderbit@38.119.177.194)
04:54.23tierra|hthat was a good presentation
04:55.55spiderbiteryeah
05:00.04*** join/#uphpu wps (~wps@208.186.134.102)
05:00.14*** mode/#uphpu [+o wps] by ChanServ
05:00.46*** topic/#uphpu by wps -> Utah PHP Users Group | uphpu.org
05:04.21spiderbiterwps, warm up to regexp any tonight?
05:04.32wpsactually yes, a little
05:05.06tierra|h*eat
05:05.29spiderbiterI've always been impressed by them, but a perpetual beginner none the less
05:06.48spiderbiterthey get kinda fun when you get the hang
05:22.59usynicI guess macnewbold is still gone?
05:23.07usynicanyone know what he found out about the md5 stuff?
05:26.34wpsI am not sure what the gentleman was trying to describe or what he had read/heard/used, but...
05:26.55wpsthere is no way that you decrypt an MD5 like he was trying to describe
05:27.04wpsif there was, we would know about it
05:27.26wpsI am not saying that it is impossible, but simply that it isn't right now
05:27.35dataw0lfI assure you that there isn't one right now.
05:27.48dataw0lfnot public nor on.. the other side... *duh duh duuuh*
05:28.07wpsMD5 is used everywhere and would be dropped in a heartbeat if it was no secure
05:28.20usynicI'd still be interested to read/hear what he thinks he saw
05:28.30wpsI would as well, usynic
05:28.46usynic*shrug*
05:28.51wpsI am willing to bet that he was either misinformed or was not expressing himself clearly
05:28.55dataw0lfI'm sure he read something.
05:29.02dataw0lfbut I don't think he was describing it correctly.
05:29.23wpsyeah
05:30.04wpssounds like both of you were there... who is who?
05:30.26usynicI was sitting in the back row with the camo shirt.
05:32.05wpscool
05:32.10wpsglad you were able to make it to the meeting
05:32.35spiderbiterIt was a good meeting
05:32.47wpsindeed
05:32.47spiderbitereven the basics are good to review sometimes
05:32.56wpsyeah
05:33.38usynicwho are you spiderbiter ?
05:34.22spiderbiterI was the punk making most of the comments
05:34.55usynicheh, not sure which punk that was
05:34.59spiderbiterabout regexp and windows not being posix
05:35.16usynicah
05:35.24spiderbiter(Although I admit I don't know what the real def of POSIX is)
05:35.38wpshe was in the middle... on the right side of the aisle... on the same row as me (I think)
05:35.46spiderbiteryeah
05:37.58dataw0lfhm.
05:38.03dataw0lfthe only one I met was macnewbold.
05:39.18usynicnight.
05:39.23spiderbiterlater
05:39.32dataw0lfg'night
05:41.02dataw0lfwps: oh, sorry, I was the guy with the tan hat.
05:41.13dataw0lfyou know, the sexy guy sitting in the back.
05:42.12spiderbiterI don't know about anyone else, but that don't help me any ;-)
05:43.24dataw0lfoh, sorry.
05:43.29dataw0lfthe really, really sexy guy in the back.
05:44.35dataw0lfhttp://www.linuxsecurity.com/content/view/117941/65/
05:46.45spiderbiteris this the alternative to locking down your wireless network?
05:47.06spiderbiteror is wireless that unsecure?
05:47.18dataw0lfyeah, wireless is pretty insecure.
05:47.23dataw0lfeven with precautionary measures.
05:48.35dataw0lfwith almost any type of new / semi new technology, exploits > security for some while.
05:48.42dataw0lfand that's certainly the case with wireless.
05:48.55spiderbiterpaint seems to be a pretty silly solution
05:49.07dataw0lfYeah, that's pretty funny.
05:50.05spiderbiterI don't worry about my wifi too much
05:50.13spiderbiterjust mac filters, I think
05:50.36dataw0lfyeah, most people don't.
05:51.08dataw0lfbasic security measures will keep wardrivers at bay for personal wifi.
05:51.24spiderbiterI tried WEP, but it exposed incompatibilities in my hardware
05:51.54dataw0lfhuh.
05:51.57dataw0lfwhat wifi card you got?
05:52.20spiderbitera cheap dlink from long ago
05:52.26dataw0lfah.
05:52.34dataw0lfI hate linksys.
05:52.36dataw0lfwmp54g etc
05:52.46spiderbiterthen I got an Orinoco, but I think I broke it
05:53.04dataw0lfI have an orinoco on my laptop but I'm having major issues getting it working right now.
05:53.53*** join/#uphpu xilch|h (~xilch@c-67-166-119-0.client.comcast.net)
05:54.20dataw0lfhowdy ho xilch.
05:54.42spiderbiterdoes anyone make any good "I play well with others" WIFI hardware?
05:55.08spiderbiterat consumer grade prices
05:55.58spiderbiterI have DLink and LinkSys routers
05:56.25dataw0lfI've heard good things about NetWaves.
05:56.28tierra|hthis was the recent news with MD5, but it had nothing to do with what that guy was mentioning
05:56.29tierra|hhttp://developers.slashdot.org/article.pl?sid=04/12/07/2019244&tid=93&tid=172&tid=8
05:57.03dataw0lfyeah, I've read that.
05:57.39tierra|hhe might of been talking about this: http://passcracking.com/
05:58.32tierra|h~28.3 Gb (rar compressed)
05:58.34tierra|h....
05:59.16dataw0lfthat isn't news though, that was on Slashdot like a year ago or something.
06:00.01tierra|hyeah
06:00.28tierra|hand it's _very_ limited
06:01.19dataw0lfI bet zero_0 downloaded it.
06:03.30xilch|hdataw0lf: I downloaded it
06:03.43xilch|hdataw0lf: and I'm hacking you with it right now
06:04.19xilch|hdataw0lf: did you notice that screen I put up on your box that looks like your desktop?
06:04.43xilch|hI'm mad l337 - not anyone could do that
06:04.47dataw0lfhey, I'll give you the first three characters of my encrypted root password, just to help you out.
06:04.49dataw0lfyou ready?
06:04.51dataw0lf$
06:04.52dataw0lf1
06:04.54dataw0lf$
06:04.57dataw0lfoOo
06:05.04dataw0lfbet you couldn't have guessed that
06:05.17xilch|hI thought it was
06:05.18xilch|hG
06:05.19xilch|hO
06:05.20xilch|hD
06:05.57dataw0lfno, that's my middle name.
06:06.01xilch|hlol
06:08.03dataw0lfdamn, the Shining is scary.
06:08.33xilch|hdataw0lf is a dull boy
06:08.50dataw0lfyeah, until Sunday when Roxie gets back from Oregon.
06:09.08xilch|hall jerk and no lay makes xilch a dull boy
06:09.53xilch|hfor some reason, one of my favorite parts is when he is bouncing the tennis ball
06:10.00dataw0lfjust got past it
06:10.35dataw0lfI wish Kubrick could've stuck to the book a bit more though.
14:24.04*** join/#uphpu wps (~wps@208.186.134.102)
14:24.14*** mode/#uphpu [+o wps] by ChanServ
15:05.24*** join/#uphpu optikal_ (~optikal@67-40-118-81.slkc.uswest.net)
15:16.41*** join/#uphpu drewbono (~andrew@67.137.25.66)
15:20.21*** join/#uphpu wps (~wade@166.70.209.92)
15:20.25*** mode/#uphpu [+o wps] by ChanServ
15:23.17optikal_morning
15:23.29optikal_doh, looks like i left myself online at home last night -- heh
15:37.32*** join/#uphpu bigdog_ut (~bigdog_ut@166.70.34.182)
15:37.32*** mode/#uphpu [+o bigdog_ut] by ChanServ
15:38.55bigdog_utmornin' all
15:40.57macnewboldmornin
15:41.30wpsZzzzzz...  Zzzzzz...
15:47.23optikal_morning
15:49.22macnewboldSo is everyone still here who was wondering about the md5 thing?
15:49.42macnewboldYou were right, it is www.passcracking.com
15:49.49optikal_aaah
15:49.52wpswe had a little discussion about it last night after the meeting
15:49.54optikal_I was wondering about that
15:50.06optikal_Never heard the after-discussion, I had to take off right after we ended.
15:50.40macnewboldthey've got 64GB of data in order to crack passwords up to 14 chars in length in just a few minutes
15:50.46macnewbold_however_, here's the catch:
15:50.53macnewboldit only works on _unsalted_ passwords
15:51.06macnewboldwhich means windows only, cause windows made a very poor security decision
15:51.35macnewboldall unix boxen AFAIK use salt on their passwords
15:51.42optikal_yeah
15:51.46optikal_heh
15:52.00optikal_I knew 1) Was a heck of a catch or 2) The homeboy was mis-informed
15:52.09macnewboldbasically, salt is a random char or two, so that the same password may have one of 256 or 65,000 different hashes
15:52.12macnewbolddepending on the salt
15:52.59macnewboldIn order to do salted passwords with 1 byte of salt, they'd need 64GB*256 = 16,000GB = 16TB
15:53.02macnewboldall on one box
15:53.17macnewboldand it would spend so much time reading from disk that it would probably get impractical
15:53.31optikal_yeah
15:53.40optikal_crazy
15:53.49optikal_good infos tho, thanks for the initiative
15:53.54macnewboldif you've got 2 bytes of salt, it's not 16TB, its 4096TB
15:54.26macnewboldThe only type of password file they talk about cracking is LanManager files
15:54.31wpsso you were right, mac? the way that they are doing it is just by having a massive database of options and running through looking for a match?
15:55.03macnewboldmore or less... the precompute part of the results of the cracking
15:55.16macnewboldif there's no salt in the hash, then you can do that and be successfull
15:55.25macnewboldthat was already well known, which is why they add salt
15:56.01optikal_yah. salt adds flavah.
15:56.06macnewbolds'right
15:56.32wpsbecause the gentleman last night was saying that there was no comparing done... no database or records... that it "just did it"
15:56.34macnewboldthe huge limitation is that anybody with a brain won't be storing passwords without salt. Apparently LanManager doesn't have a brain.
15:56.46wpswhat is LanManager?
15:57.06macnewboldyeah, he didn't read the whole page. Even the abstract of the paper they published on the algorithm gave away all the details.
15:57.21macnewboldLanManager is or was an old networking protocol, IIRC
15:57.21bigdog_utbut are we still talking md5 hashes or passwords?
15:57.23macnewbold~lanmanager
15:57.37*** join/#uphpu mindjuju (~mindjuju@63.226.104.67)
15:57.49bigdog_utdataw0lf, you around?
15:57.55macnewboldbigdog_ut: you give them an md5 hash (unsalted) and they'll give you back a password in a few seconds or minutes, with a really high (over 99%) success rate for passwords up to 14 chars
15:58.17macnewboldbut here's the catch: nobody uses unsalted passwords
15:58.17macnewboldso it's practically useless
15:58.24bigdog_utor unsalted md5 sums?
15:58.50wpsso if it is practically useless... why do you think these people have spent so much time on it?
15:59.24mindjujusorry, joining the conversation late, what is the difference between salted and unsalted md5 hash? and when you md5(str); is that generating a salted or unsalted hash?
15:59.27macnewboldmd5 sum, md5 hash, I use them interchangably. What's the difference you're tlaking about?
15:59.40macnewboldmindjuju: every md5() I know of uses salt
16:00.09macnewboldthey add one or two random bytes at the beginning, so that same pass with different salt gets different hash
16:00.23macnewboldso you can't do what they're doing: precompute hashes, and just look up the hash they give you :)
16:01.04macnewboldwithout salt, if I use the same password on two accounts, they'll get the same hash, and you'd immediately be able to tell that they use the same password
16:01.22wpsso what do you think the goal of that project is then, Mac?
16:01.41macnewboldIf they wanted to redo all their precomputation for a particular salt value, they'd be able to do the same thing for any hash that used that salt.
16:01.48wpsare they just dumb enough that they don't realize that it doesn't work? or do they have some other goal in mind?
16:02.54bigdog_uti think it is the math behind they are interested in
16:03.04bigdog_utif they have the money for that type of system
16:03.04optikal_Assuming from the name of the domain... hehe
16:03.21wpsso... if I run MD5() on a Microsoft Windows server, it is not salted? but if I run it on any other system, it is salted?
16:03.52macnewboldwps: it works on dumb password files only
16:04.02macnewboldbut there still are a few things that use such files
16:04.07macnewboldlike LanManager, apparently
16:04.07optikal_yeah.  any new day language that does md5, salts
16:04.26macnewboldsalt is a principle that's been around for decades
16:04.35macnewboldwhy lanmanager didn't use any is beyond me...
16:05.01optikal_yah.  that site isnt even worth remembering, it'll never come to use in my upcoming days.
16:05.01bigdog_uti dont salt...i just pepper
16:05.03macnewboldthis is an attack that they knew would be possible even before they invented MD5
16:05.08optikal_mm.. pepper.
16:05.14macnewboldthey're not worried about it because it's so impractical
16:06.02macnewboldif you assume a character set of 90 chars (alphanumeric=62, plus various punctuation marks)
16:06.03optikal_Thanks again for lastnight.. sharpened up my RE and Regex a bit. =)
16:06.51macnewboldthere are 531 Billion possible passwords
16:07.35mindjujuyeah, mac, good lesson last night, learned a lot about strings
16:08.10macnewboldbut with 2 bytes of salt, those 531 billion passwords have 34,800 Trillion (24 quadrillion?) possible hashes
16:08.37macnewboldthat's just a 6-char password. not even _up_ to 6 chars
16:08.53macnewboldand the 7 char passwords date have 90 times as many options
16:09.48macnewboldeven 1 char passwords with 2 bytes of salt have 6 million possible hashes
16:10.11wpshere's a question: how would one obtain the hash of someone's password?
16:10.12macnewbold2 char password: 530 million hashes
16:10.39macnewboldwps: in unix/linux, they usually keep the hashes in a password file only accessible to root
16:10.39optikal_access to the database
16:10.39optikal_or the pwd file
16:10.48wpsright, so how would a hacker get it?
16:10.51macnewboldso in practice, it means you hack the database or the password file, by getting root access
16:11.07macnewboldor for a database, less than root may be sufficient, like the www user
16:11.26optikal_wps: find a security hole/leak to overflow as root.. but there are hundreds of other possibilities
16:11.28macnewboldbut if you broke into the box, you don't need passwords anymore :)
16:11.43wpsthanks kind of what I was thinking :)
16:11.46optikal_most "hackers" dont mess around with cracking passwords
16:12.19optikal_Any real admin has atleast a 10+ character alphanumeric, case sensitive password... and that can get pretty interesting.
16:12.24macnewboldyeah, about all you can get with a cracked password is to log in to their account somewhere else that uses the same password
16:12.32macnewboldwhich is pretty common
16:12.44macnewboldand with log files on the box you hack, you can see where they log in from
16:13.05macnewboldonce you've got user access, you just need to know about some exploit in the OS or software they run, and you'll get root
16:13.12macnewboldthen you've got more password hashes :)
16:14.30macnewboldbtw, wps, I've got my slides updated with the stuff I forgot to put in for last night, and added a couple of slides (one on the modifiers for parens, for non-capturing and lookaheads, and one at the end going over the examples we finished with)
16:14.37macnewboldhow should I post them on the site?
16:14.59macnewboldlater today I'll have a text and/or html version(s) of the slides too
16:15.17macnewboldhas dave sent the audio recording over yet?
16:15.18wpsthere currently is not a way for anyone to upload to the site (no FTP server running, for security reasons)
16:15.31wpshe said he'd have it to me in a couple of days
16:16.14macnewboldcool
16:16.24wpsso, the easiest thing would be for you to either toss it on a server for me to download from or to email it (preferring the preferring as I don't like attachments)
16:17.35wpsman, that didn't make sense
16:17.42macnewboldI got what you mean
16:17.46macnewboldand I wasn't even going to tease you about it
16:17.50wpsso, the easiest thing would be for you to either toss it on a server for me to download from or to email it (preferring the former as I don't like attachments)
16:18.37macnewboldyeah
16:18.40macnewboldI can do that
16:20.59optikal_Why run through unsecure FTP anyways? SCP is the ticket
16:20.59macnewboldamen
16:20.59macnewboldeven sftp is nice though
16:20.59optikal_yeah of course
16:21.11wpsthat's what I said... that I don't even have FTP installed on the server (for security)
16:21.18macnewboldyeah, keep it that way :)
16:21.23wpsSSH or SCP is the only way to access the box
16:21.24wpsyup
16:21.31wpsFTP is junk
16:21.48wpswell... not necessarily junk... it is fast
16:21.53macnewboldso's scp
16:22.00optikal_aah.  I thought you were saying FTP is not installed, and that it arises a problem getting files on the server.. Im thinkin "hmm.. okay"
16:22.01optikal_heh
16:22.20wpsscp is my best friend
16:22.34wpswell, second best friend (my wife is first)
16:23.00wpsscp and an key on the remote server and you are in file transfer bliss
16:23.38wpsI love being able to scp between two remote machines
16:23.56optikal_yeah
16:24.02macnewbolddoh... the ppt version I uploaded this morning ended up being the .ppt.lnk file on my desktop instead of the real .ppt, cause I was in such a hurry
16:27.39wpssorry I forgot to announce the bit about the publication coordinator at the meeting last night, mac
16:28.07wpsSomeone did finally contact me this morning expressing interest in however.
16:28.17wpshe was looking for more information
16:28.22wpsI forwarded my response to the group
16:28.55mindjujuyeah, that was me, I was really looking for info on the irc channel when i found that
16:29.15wpsoh, hey mindjuju
16:29.19wpshadn't notice you in here, sorry
16:29.37mindjujuno worries, i just sorta sneaked in, then worked while i reviewed the comments
16:29.44mindjujusorta jumping in and out of conversation
16:31.12synicmacnewbold, morning, and good job last night.
16:31.23mindjujuwell, i do have journalism experience and it would be a good opportunity to get to meet more people in the group.  Were ya'll thinking PDF based or web based publication?
16:31.36macnewboldthanks, synic, and good morning to you too :)
16:32.26macnewboldI think we'd been thinking web based, but PDF sounds like a good idea too... generate some hardcopy now and then to spread around, etc.
16:34.41mindjujuweb based would be cool; keep the decor of the website but give it a newspaper feel
16:34.58mindjujuwe could then print that to PDF and go with it, or make small mods and issue PDF
16:35.09synicso, php5's md5 doesn't use a salt - unless you use the mcrypt functions
16:35.38wpsyeah, the website is already all set up for the articles. We just need authors.
16:35.50wpsPHP5's md5 doesn't use salt?
16:36.02synicnope
16:36.53mindjujuoh, i see
16:43.27macnewboldah, here's the magic:
16:43.33macnewboldwww.php.net/crypt
16:43.58macnewboldif you're doing a password, use crypt with the MD5 or 3DES option (since DES is weak)
16:44.13macnewboldto make the initial hash, let it choose random salt
16:44.35macnewbold(md5 uses 12 chars of salt by default!)
16:45.24synicah, just like the C one
16:46.08macnewboldto check the password, you tell it the salt you're checking against and you can tell if they match
16:46.30wpsbecause blowfishes are cute
16:46.41synica little pointy, but yeah, cute :)
16:46.48macnewboldso who wants to write a short article for the web site on when to use md5, when to use crypt, and how to do secure passwords with crypt?
16:47.09synicI could do that
16:47.18optikal_hehe
16:47.34wpsexcellent idea, mac
16:48.21macnewboldsecurity wouldn't make a bad presentation, either
16:48.35synicany interest in the mcrypt or mhash functions as well?
16:48.42syniclike encrypting files with blowfish or whatever
16:48.46macnewboldsure, why not
16:48.58macnewboldyou could even do it in separate articles if you want
16:49.17macnewboldbigdog_ut: I was thinking about some possible stuff to present on, and was talking with fungus on the way home...
16:49.47synicso - bigdog_ut was there last night, even though he said he might not be, wasn't he?
16:49.49wps(mac's care is really humid)
16:50.06wpscorrection: (mac's car is really humid)
16:50.52macnewboldwe could do something about all the cool things you can do if you set up a php script as an 404 error handling page with your apache
16:51.02wps(he passes the time on long trips by talking to the fungus)
16:51.26macnewboldfor a minute I thought you were trying to suggest the windows in my car were steamed up or something... ewww
16:51.38synicmacnewbold, hehe.  I was wondering if that's how they do the php.net/str_replace type stuff.
16:51.46macnewboldyep
16:51.51wpsnah... just laughing at how funny it sounded
16:51.52macnewboldthe source is open if you want to check it out
16:52.02wps"I was talking to fungus on the way home"
16:52.02macnewboldthere's a cvs repo on the web with all the stuff for the php.net site
16:52.04wpsfunny nick
16:52.15wpsyeah, thanks for the tip last night macnewbold
16:52.24macnewboldah, I get it... so humid my car grows fungus...
16:52.27macnewboldand I talk to it
16:52.32wpsthat "php.net/<function>" trick is awesome!
16:52.38macnewboldyes! It rocks
16:52.50macnewboldand you can do a ton with it on your own sites
16:53.00wpsSO much quicker than waiting for the page to load and then typing in the search field
16:53.18macnewboldoh yeah... _way_ better
16:54.40macnewboldI've got some sites that use error scripts to generate and return (cacheable) GD images on the fly, filled with pretty antialiased TTF-rendered text that was the name of the file they were looking for
16:55.51wpswe're doing it on our site
16:55.59wpsexample lookup: http://utahrealestate.com/2309423
16:56.21wpsand one that is successful: http://utahrealestate.com/463608
16:56.56*** join/#uphpu drewbono (~andrew@67.137.25.66)
17:05.04*** join/#uphpu fungus (~fungus@firebat.aros.net)
17:26.03*** join/#uphpu alphahawk (~alphahawk@70.56.105.158)
17:31.26alphahawkQuestion for you guys. Has anyone ever done a system that acts as a print server through the web. i.e. I upload a file to the server and then the server prints it.
17:32.29synicwe do something similar... maybe not exactly what you need.
17:33.42synicour company is an online greeting card company.  You pick a card online, fill out what you want it to say, upload a picture if you want, choose your font, and click go
17:34.05syniceverything is stored on the webserver, and at about 6:00 AM our print machine downloads everything
17:34.24synicimages are continually downloaded 24/7
17:34.58synicwe then have a guy run the print jobs.  This could be automated, but being that they are greeting cards, he's there to make sure everything turns out ok
17:35.25alphahawkwhat I am trying to do is if  customer at a hotel supports wants to print a document then he uploads the file to the server and the server prints iot
17:36.02synichrmm, what type of file?
17:36.21alphahawkthats the issue is I want to support multiple file types.
17:36.47synicI wonder if there's a way to script openoffice to do it
17:36.49alphahawkbut I have decided I am going to keep it to the major ones like .doc, .xls, .pdf, etc...
17:37.16bigdog_utwhat type of print server os are you using?
17:37.20alphahawkthat was what i was going to try. that or if someone has a script that creates a pdf file out of it
17:37.56alphahawkbigdog_ut: pretty flexable on that. My main choice right now is slackware linux but if need to use ms I will
17:39.21alphahawkprobably the biggest requirment is to be able to do it as a automated script so that theoretically the hotel clerk never has to open the file.
17:39.42synichttp://scripting.openoffice.org/
17:40.17bigdog_utalphahawk, look at tools for cups...there might be some scripts for accesing it that way
17:40.34synicyeah, but then there's still the problem of opening the different filetypes
17:40.34bigdog_uti know they have a web admin interface that perhaps you could mimic
17:41.03bigdog_utyou need to convert the files after they are uploaded
17:41.09alphahawkI can mimic the interfaces and run commands problem is opening the files like synic said
17:41.29alphahawkthat is the question is how to convert the files I have not found a good way to do the convrsions
17:41.31bigdog_utopenning for what?
17:41.44bigdog_utyou might have to shell out and send to printer
17:42.03bigdog_utyou still might need to shell out and do the conversions
17:42.25bigdog_utimgs you might be able to do in php
17:42.41bigdog_utbut alot of the text ones you might have to shell out
17:42.56bigdog_utthat is how we did our fax server
17:43.27bigdog_utbut we went from any file type to pdf/tiff
17:45.21alphahawkbigdog_ut: going pdf/tiff would work fine. Question is how do you do the conversions
17:45.36bigdog_utcommand line tools
17:45.51alphahawksorry when I said opening I ment converting
17:46.06alphahawkcommand line tools built into linux or windows?
17:48.06alphahawkbigdog_ut: where the command line tools built into linux or windows?
17:49.18bigdog_utlinux
17:49.25optikal_alphahawk: dataw0lf made as mall encapsulation class for the PDFLib library.. it may help, http://www.dataw0lf.org/code/snippets/cPDFlib.phps
17:49.35optikal_err "a small"
17:51.38alphahawkthanks optikal_
17:51.49mindjujui just found this info about coverting docs in OO to pdf
17:51.50mindjujuhttp://www.oooforum.org/forum/viewtopic.php?t=3772
17:51.55optikal_np.  not sure if it will help, i have yet to deal a lot with pdfs
17:51.58mindjujuhope it helps
17:52.16alphahawkbigdog_ut can you tell me what to google for to get more info on those command line tools? or where they custom tools
17:54.57alphahawkmindjuju: that helps alot actually
17:55.19mindjujugreat!  I just noticed though that it is for MS and not linux
17:55.26mindjujubut it is commandline
17:55.35mindjujuwin some lose some! :)
17:55.46alphahawkno command line is exactly what I need
17:56.07alphahawkwould be better if php built in but didn't expect to find anything for that
18:15.25bigdog_utalphahawk, depends on which why you are going
18:15.43bigdog_uts/why/way/
18:16.34bigdog_utthere is the wvware that is for ms docs
18:16.48bigdog_utcheck them out on sf
18:17.02bigdog_utthat does word docs to other formats
18:17.16bigdog_utlike wvPDF converts word docs to pdf files
18:17.34bigdog_utimages you want to convert to something like tiff images
18:17.51bigdog_utbut cups should handle most of the formats
18:23.26alphahawkya I can do images fine that is a easy one actually its the word docs and stuff like that
18:26.35*** join/#uphpu drewbono (~andrew@byu176783wks.rn.byu.edu)
19:01.47*** join/#uphpu tierra|w (~tierra@dsl093-225-126.slc1.dsl.speakeasy.net)
19:28.32*** join/#uphpu drewbono (~andrew@byu176783wks.rn.byu.edu)
19:42.37dataw0lfOk... *sigh* I'm updating to PHP 5.
19:43.29synicwhat fer?
19:44.34optikal_hehe
19:45.13dataw0lfcuz I found some good deb packages for PHP 5 and the newest Postgres
19:45.19dataw0lfok, maybe not.
19:50.34optikal_?
19:50.58dataw0lfdependency issues and I'm not keen enough on installing PHP 5 to fix it.
19:51.01dataw0lfie, too lazy.
19:53.04dataw0lflike father, step-father, the son is drowning in the flooooood.
19:55.55alphahawkhey dataw0lf question for you. I was given a link to a phpclass you had done. its cPDFlib.phps question is does it convert word documents to pdf?
19:58.00optikal_hehe
19:58.42dataw0lfalphahawk: oh, no.  It's primarily for pulling SQL records out and creating a pretty PDF from them.
19:59.14dataw0lfalphahawk: theoretically, you could use that class to convert sxw docs to PDF, but not word documents as far as I know.
19:59.23wpsthanks for the article, synic!
19:59.27synicwps, np
19:59.34synicwps, hope it makes sense :)
20:09.57alphahawkdataw0lf: okay thanks thats what I needed to know
20:10.12dataw0lfnp
20:12.26*** join/#uphpu optikal- (~optikal@c-24-10-198-60.client.comcast.net)
20:16.28bigdog_utalphahawk, you can use the wv cli tools to do conversions on word docs
20:16.35bigdog_utsynic, good article
20:16.50synicthanks
20:19.08bigdog_utmacnewbold, you around?
20:19.23macnewboldyeah
20:21.06bigdog_utwas it you that put a link up in irc a couple weeks back on why not to write your own security type functions?
20:21.19bigdog_utit was a link to a security guy's blog on home grown security functions
20:21.34bigdog_utit was a killer article, i would love to put it up on uphpu
20:21.34macnewboldhm... no, I don't think so.
20:21.40bigdog_utanyone recall that?
20:21.49macnewboldbut I've got IRC logs, so if you know a string I should grep for, I'll look for it
20:22.05bigdog_utgrab the urls and i will look
20:22.12macnewboldsynic: I'm with bigdog_ut - nice article! you posted that really quick
20:23.42optikal_Typo.. ."This articles provides"
20:23.45macnewboldhere's one
20:23.47macnewboldhttp://www.linuxsecurity.com/content/view/117941/65/
20:23.47*** join/#uphpu beandog (~sdibb@403238C8.ptr.dia.nextlink.net)
20:25.43macnewboldlemme know if I should keep looking, bigdog_ut - I checked Jan and Dec., and that's the only one that sticks out, other than something about an apache vuln.
20:26.17mindjujuwell that's a curious article about the anti-wardriving paint on that link you provided
20:27.24dataw0lfyeah, I posted it last night, that's not the one.
20:28.09optikal_synic: yeah, great article man. ^5
20:32.49dataw0lfsynic: terrible article.
20:33.16optikal_hah
20:33.32bigdog_utmacnewbold, no that is not the one
20:33.40bigdog_utperhaps you where not on
20:34.01macnewboldmaybe not
20:34.08macnewboldjbot has logs
20:34.12bigdog_utbut it was a personal blog i remember that
20:34.25bigdog_utlet me check it
20:34.31beandoganyone a mailing list guru?
20:34.45bigdog_utwps is
20:34.53beandogwps?
20:34.54bigdog_utwhat is the url to jbot
20:35.00macnewboldbut I don't remember the url for the logs
20:35.03wpsto the archives?
20:35.06macnewboldyeah
20:35.07bigdog_utyeah
20:35.09beandogNah, wade wouldnt like what Im planning to do. ;)
20:35.11wps~uphpu archives
20:35.12jbotuphpu archives are http://ibot.rikers.org/uphpu/
20:35.26bigdog_utlet me check
20:35.34beandogoh wow thats cool
20:36.56*** join/#uphpu mindjuju_ (~mindjuju@63.226.104.67)
20:40.10bigdog_utthat archive did not go back that far
20:40.37dataw0lfHrm, I guess I could post my logs on my site for you to look through if yah want.
20:40.38bigdog_uti would love to have all the archives
20:41.05macnewboldbigdog_ut: the gzips below go clear back to last june
20:41.41bigdog_utoh
20:41.54bigdog_utthat would be nice to have one the site that are search able
20:41.56*** join/#uphpu xilch (~xilch@66.239.17.228.ptr.us.xo.net)
20:42.24xilchhey macnewbold - great presentation
20:43.00macnewboldthanks!
20:43.08dataw0lfI need to start following my New Year's resolutions
20:43.13macnewboldrealname(xilch)==?
20:43.19dataw0lfmacnewbold: yeah, excellent presentation
20:43.28macnewboldglad you enjoyed it
20:44.07xilchmacnewbold: my name is Rick Davenport
20:44.25macnewboldwhere were you sitting? so I can put a face to the name/nick
20:44.33dataw0lfin the back with us.
20:44.41dataw0lfto the left of tierra.
20:44.47xilchI was in the back next to tiarra and adam/synic
20:44.56xilcher, tierra
20:45.07dataw0lftiara is more appropriate.
20:45.13xilchlol yeah
20:45.21xilchwe should get him one
20:45.28dataw0lfI'm sure he already has one.
20:45.41xilchanother one then, that is pink
20:46.01macnewboldhehe
20:46.01dataw0lfWe wouldn't be able to take it off if we gave him a pink tiara.
20:46.15macnewboldhe'd look good in pink, I think :)
20:46.34dataw0lfhere, I'll get his attention so he can see we're humiliating him.
20:46.35dataw0lftierra|w:
20:46.45dataw0lfyou're a flamer.
20:47.40dataw0lfthis is ridiculous, what is Lil Jon doing in my music collection???
20:48.01beandogLil Jon?
20:48.11dataw0lfa rapper.
20:48.17beandogo
20:48.34dataw0lf'Toooooo the windooooow, to the waaaaall'
20:48.39tierra|w?
20:48.55dataw0lftierra|w: read your backlog.
20:49.22tierra|wyour lucky this is the UPHPU channel
20:49.53dataw0lf*you're
20:50.23dataw0lfhere, I'll make fun of you on EFNet too.
20:51.01optikal_heh
20:59.44*** join/#uphpu drewbono (~andrew@byu176783wks.rn.byu.edu)
21:07.14*** join/#uphpu Rajah (~mike@208.177.141.226.ptr.us.xo.net)
21:15.24macnewboldnice, 18 people now... we've gotten a lot more people to come join us in irc lately...
21:15.38macnewboldit wasn't long ago we only had 6 or 8 in here at a time, two of which were bots :)
21:16.04optikal_haha
21:17.45Rajahwasn't there someone looking for php streaming software.
21:17.55bigdog_uti think
21:18.49RajahI had mentioned andromeda yesterday while reading Linux Journal I found this one... http://pancake.org/zina/
21:19.13Rajahbascially an open source version of andromeda
21:19.23RajahThere is one more if I can remember it I will post it
21:19.49optikal_aah
21:19.51optikal_I was interesting
21:19.59optikal_s/interesting/interested
21:20.26Rajahok I will go find the other one then as well.
21:27.09optikal_awesome
21:29.22alphahawkRajah I was looking at streaming software
21:30.28optikal_thats who it was. i forgot heh
21:30.32RajahThought I might have a copy of the magazine here, but it must be at home I will try and remember tomorrow.
21:30.40optikal_no worries
21:30.44optikal_thanks for the link thusfar.
21:32.54*** join/#uphpu mindjuju (~mindjuju@63.226.104.67)
21:38.26*** join/#uphpu mindjuju (~mindjuju@63.226.104.67)
21:41.57alphahawkoptikal_ I am testing the icecast streaming software now
21:42.06optikal_alphahawk: awesome, i'
21:42.12optikal_i'd love to hear how it goes.
21:43.29alphahawkfyi the guys in the icecast channel are cranky
21:46.58optikal_hehe
22:15.32*** join/#uphpu xilch|w (~xilch@66.239.17.228.ptr.us.xo.net)
22:32.26bigdog_utanyone outside uphpu is cranky
22:34.45macnewbold:) hehe... but never anyone inside
22:34.48macnewbold~uphpu++
22:40.12*** join/#uphpu drewbono (~andrew@byu176783wks.rn.byu.edu)
22:46.08bigdog_utcommon look @ how many we have now
22:47.45*** join/#uphpu synic (~synic@66.239.17.228.ptr.us.xo.net)
22:55.22macnewboldsynic: you should send out an email message to the list about your new article, to tell people that were at the meeting what we found out, etc.
22:56.29synicwhat exactly did we find out? I only read part of it.  That the site has a large DB of words, which actually can crack an unsalted md5 hash up to 14 characters?
23:00.12macnewboldmostly I meant that we know md5 is still secure, as long as you use it right (i.e. crypt(), w/salt) if you're doing passwords, rather than using the md5() function
23:00.56synicyou mean with password() ?
23:00.59macnewboldbut basically, that passcracking.com site built a big db of precomputed stuff, and just have to go find the one that matches your password
23:01.20macnewboldno, I meant md5()...  /me doesn't remember what password() does
23:02.09synicnope, it doesn't.
23:03.06synicmysql> select md5( 'bwent' );
23:03.06synic+----------------------------------+
23:03.06synic| md5( 'bwent' )                   |
23:03.06synic+----------------------------------+
23:03.06synic| 149911be96ebe2a393f2a4b07cc81a92 |
23:03.07synic+----------------------------------+
23:03.13synic[synic@bwent ~]$ php -r "print md5('bwent');"
23:03.13synic149911be96ebe2a393f2a4b07cc81a92
23:07.12macnewboldwell, at least they match :) that's a good sign
23:08.02synichehe
23:08.29tierra|wactually, all my hashes are hashed a second time with an internal string (made from a hash of random characters)... while that string could be taken as well if the hashes were every compromised, it also means the person would have to come up with all new tables anyway making that site useless
23:08.41tierra|ws/every/ever
23:09.10tierra|wmy own way of salting my hash browns
23:10.11synicmmm
23:10.14synichash browns
23:23.29*** join/#uphpu drewbono (~andrew@byu176783wks.rn.byu.edu)
23:23.52bigdog_utthey both use the system implementation of md5 though
23:25.36dataw0lfYeah, I thought what was brought up was a problem inherent with the md5 encryption scheme in and of itself.
23:25.46dataw0lfwhich I haven't heard of.
23:26.44bigdog_utbut does unix impl of md5 use a salt internally?
23:29.15dataw0lfNo.
23:29.33macnewboldnew
23:29.37macnewboldI mean, yes
23:29.45bigdog_utyes it does use salt in it?
23:29.47macnewboldalthough it uses the salt on passwords
23:29.55macnewboldnot for the general md5 computation
23:30.06synicman crypt
23:30.11dataw0lfsalt's are just added for the benefit of more security.
23:30.17bigdog_utyeah
23:30.23dataw0lfsince a 'hacker' would have to bruteforce the salt as well.
23:31.18macnewboldif you ever look at a password file on linux/unix, etc, if it's using MD5, the password hashes will have something like $1$1ba81f83$<hash>
23:31.36macnewboldthat's the code for "I'm an md5 hash, and here's my salt"
23:31.47dataw0lfsure, it uses salt for password encryption.
23:31.58dataw0lfbut *nix systems don't default to a salt.
23:32.18macnewboldyeah, they do, for passwords. whether it's md5 or des or whatever
23:32.37macnewboldbut a standard md5() call has not much to do with salt... it's just a hash
23:32.43dataw0lfthat's what I'm saying.
23:33.05dataw0lfif you call md5 in a *nix system it won't magically add a salt for you.
23:33.25macnewboldright. I guess I've been talking about it wrong... salt is something you use with passwords and such, not something that is a part of the hashing strategy
23:33.54macnewboldsalt's like an automatic way to add 12 random chars to any good or bad password, to make it much more secure
23:35.12*** join/#uphpu drewbono (~andrew@byu176783wks.rn.byu.edu)
23:36.38bigdog_utcause it is said in the email that linux uses salted md5 hashes?
23:36.59macnewboldyes, they do, in their password files
23:37.11macnewboldbut a plain old md5 hash isn't salted (in any language)
23:38.02bigdog_utbut i think they use sha1 though for those right?
23:40.03tierra|wthat's what I thought
23:41.57bigdog_utwhat sucks is that site runs on m$ crap
23:42.07bigdog_ut-> passcracking.com
23:46.11macnewboldbigdog_ut: don't know whether they default to sha1 or md5, but it's salted, for sure. Check your password file: if the hashes start with $1$ it's md5, or $2$ is blowfish or sha1 or something.
23:53.20*** join/#uphpu wps (~wps@byu074602wks.rn.byu.edu)
23:53.25*** mode/#uphpu [+o wps] by ChanServ
23:54.11*** join/#uphpu spiderbiter (~spiderbit@38.119.177.194)

Generated by irclog2html.pl by Jeff Waugh - find it at freshmeat.net! Modified by Tim Riker to work with blootbot logs, split per channel, etc.