<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-6835589</atom:id><lastBuildDate>Tue, 16 Dec 2025 02:31:44 +0000</lastBuildDate><category>geek</category><category>freebsd</category><category>humor</category><category>soapboxes</category><category>bsd</category><category>ideas</category><category>life</category><category>akpl8s</category><category>family</category><category>history</category><category>language</category><category>steph</category><category>consumer rights</category><category>cperciva</category><category>health</category><category>tycho</category><category>6981st</category><category>ALD09post</category><category>administrivia</category><category>film</category><category>google</category><category>passwords</category><category>spam</category><title>Royce Bits</title><description>An eclectic eccentric making the esoteric electric</description><link>http://roycebits.blogspot.com/</link><managingEditor>noreply@blogger.com (Royce Williams (TychoTithonus))</managingEditor><generator>Blogger</generator><openSearch:totalResults>69</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6835589.post-6499711963286661790</guid><pubDate>Sat, 19 Apr 2025 22:48:00 +0000</pubDate><atom:updated>2025-04-19T14:49:21.129-08:00</atom:updated><title>The Nested Mechanical Turk</title><description>&lt;p&gt;(Speculation, and not the whole story ... but fits some facts):&lt;/p&gt;&lt;p&gt;For more than a decade, foreign influence operations have used techniques from technology, marketing, and social media -- tracking interaction/propagation, correlating with marketing metadata, A/B testing,&amp;nbsp;etc. -- to map people to their &quot;trigger&quot; topics: ones that emotionally activate them and short-circuit their reasoning, things &quot;close to the bone&quot; (things they either love, hate, or fear). It&#39;s important to note that these trigger topics are often rooted in deep, understandable, and often positive instincts -- patriotism, group bonding, protecting children, etc. These chess pieces are already on the board.&lt;/p&gt;&lt;p&gt;Once mapped, social subgraphs can then be analyzed to find&amp;nbsp;&lt;i&gt;supernodes&lt;/i&gt;&amp;nbsp;-- the accounts (real or bot) that are best at producing highly viral content in each subgraph. These accounts can then be used to seed specific content that gently starts to map trigger topics to target belief outcome -- to *condition* people, in the classic, operant conditioning, Pavlovian sense.&lt;/p&gt;&lt;p&gt;By aligning trigger topics with belief outcomes&amp;nbsp;&lt;i&gt;slowly&lt;/i&gt;&amp;nbsp;over time, target populations can be pushed along a spectrum of beliefs until their behavior seems quite at odds with their beliefs.&lt;/p&gt;&lt;p&gt;Some populations are&amp;nbsp;&lt;i&gt;more vulnerable&lt;/i&gt;&amp;nbsp;to this than others, either by nature or nurture. To exploit this, subgraph data, including influence outcomes, can be mapped to demographic data (age, race, gender, political or religious affiliation, buying habits, data etc.), as well as data from public leaks. This correlation enables automation of identifying, and efficiently focusing effort on, vulnerable populations.&lt;/p&gt;&lt;p&gt;The element of&amp;nbsp;&lt;i&gt;surprise&lt;/i&gt;&amp;nbsp;is also important. Weaponizing these subgraphs takes time ... and can be countered if spotted too early! So this infrastructure is also used to study which methods are *more likely to not leak out too soon*. (Private chat groups, on Facebook and elsewhere, seem efficient here.)&lt;/p&gt;&lt;p&gt;Another important element is&amp;nbsp;&lt;i&gt;inoculation:&amp;nbsp;&lt;/i&gt;conditioning target populations to ignore, and even be actively hostile to, factual talking points that might otherwise persuade a reasonable person. (This is why reactions to such talking points can be startling immediate, automatic, homogeneous, and dismissive. It may also be a factor in why polling is misleading; it seems feasible to condition people to avoid, or even actively lie to, pollsters).&lt;/p&gt;&lt;p&gt;Taken in total, it should be clear why externally observable outcomes might seem inexplicable -- and why outsiders dipping into these input streams can find it so disorienting and self-contradictory. By the time visible markers of this influence start to &quot;bubble up&quot;, the&amp;nbsp;&lt;a href=&quot;https://en.wikipedia.org/wiki/Overton_window&quot; target=&quot;_blank&quot;&gt;Overton window&lt;/a&gt;&amp;nbsp;of what its victims will believe has already dramatically shifted. Put another way: when a public figure starts dropping specific talking points to their base that seem instantly popular &quot;out of the blue&quot; ... it was only out of the blue&amp;nbsp;&lt;i&gt;to you&lt;/i&gt;. That topic was&amp;nbsp;a submerged iceberg -- one that the target population has been exposed to for months or years. Only when the benefits of exposing the tip of that iceberg are judged to be worth the reveal, will it be &quot;burned&quot; (to mix my metaphors).&lt;/p&gt;&lt;p&gt;It should also be clear why traditional reasoning about root causes (&quot;What caused this?&quot; punditry) seems to keep falling short. By minimizing or skipping entirely the role of disinformation, think pieces and news coverage trying to leverage pre-social-media concepts to grapple with&amp;nbsp;unexpected outcomes are woefully missing the mark. It should be obvious that part of the reason for this is that &lt;i&gt;they have no tools to observe or assess this influence&lt;/i&gt;.&lt;/p&gt;&lt;p&gt;This should also help to explain that while protecting the voting process itself is necessary, it is not sufficient; and why relatively little money might need to be spent on campaigning:&lt;/p&gt;&lt;p&gt;There is less need to hack the&amp;nbsp;&lt;i&gt;vote&lt;/i&gt;&amp;nbsp;... if you&#39;ve already hacked the&amp;nbsp;&lt;i&gt;voter&lt;/i&gt;.&lt;/p&gt;&lt;p&gt;The tools of digital marketing have been repurposed to weaponize your friends, co-workers, and family, in an almost Manchurian Candidate way. Which -- to me personally -- means that we should not be fully blaming the victims here. Were many of them already like this? Probably; exploiting the subgraph efficiently means discovering and exploiting the pieces that were already on the chessboard. But would those people have taken things&amp;nbsp;&lt;i&gt;to this extreme&lt;/i&gt;&amp;nbsp;without amplification at scale? Probably not.&amp;nbsp;&lt;/p&gt;&lt;p&gt;The people are on the outside, and the machine is on the inside.&lt;/p&gt;&lt;p&gt;Some questions:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Who is running the machines?&lt;/li&gt;&lt;li&gt;How long ago did AI get applied to accelerate them?&lt;/li&gt;&lt;li&gt;What are the visible signs of machines acting in tandem, or in opposition?&lt;/li&gt;&lt;li&gt;Assuming it&#39;s true ... what can we do about it?&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;h3&gt;References:&lt;/h3&gt;&lt;p&gt;&lt;a href=&quot;https://www.cisa.gov/search?g=war+on+pineapple&quot;&gt;The War on Pineapple (CISA)&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.amnesty.org/en/latest/news/2019/07/the-great-hack-facebook-cambridge-analytica/&quot;&gt;‘The Great Hack’: Cambridge Analytica is just the tip of the iceberg (Amnesty International)&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://slatestarcodex.com/2018/10/30/sort-by-controversial/&quot;&gt;Sort by Controversial (Scott Alexander)&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;</description><link>http://roycebits.blogspot.com/2025/04/the-nested-mechanical-turk.html</link><author>noreply@blogger.com (Royce Williams (TychoTithonus))</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6835589.post-2819879421613839448</guid><pubDate>Sun, 17 May 2020 05:27:00 +0000</pubDate><atom:updated>2020-05-16T21:28:44.643-08:00</atom:updated><title>Fixing &quot;error code: 1275&quot; when using PHLASH to update BIOS on ancient laptops</title><description>&lt;div style=&quot;-webkit-font-smoothing: antialiased; background-color: white; border: 0px; box-sizing: inherit; margin-left: 30px; min-height: 19px; overflow-wrap: break-word; padding: 0px; text-size-adjust: none; vertical-align: top;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;If you happen to be&amp;nbsp;&lt;a href=&quot;https://www.techsolvency.com/distance-asd/chromebook/&quot;&gt;turning old laptops into Chromebooks&lt;/a&gt;&amp;nbsp;or something, and you&#39;re trying to flash the BIOS on an ancient laptop, and you can&#39;t do it from a DOS boot USB because it&#39;s a Windows-only flash utility, and you run into something like this:&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-font-smoothing: antialiased; background-color: white; border: 0px; box-sizing: inherit; font-size: 15px; margin-left: 30px; min-height: 19px; overflow-wrap: break-word; padding: 0px; text-size-adjust: none; vertical-align: top;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-font-smoothing: antialiased; background-color: white; border: 0px; box-sizing: inherit; font-size: 15px; margin-left: 30px; min-height: 19px; overflow-wrap: break-word; padding: 0px; text-size-adjust: none; vertical-align: top;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;&quot;&gt;Cannot load driver C:\dell\BIOS\WINPHLASH\PHLASHNT.SYS.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-font-smoothing: antialiased; background-color: white; border: 0px; box-sizing: inherit; font-size: 15px; margin-left: 30px; min-height: 19px; overflow-wrap: break-word; padding: 0px; text-size-adjust: none; vertical-align: top;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;&quot;&gt;Please check your accounts, if you have no administrator privilege, please login again!&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-font-smoothing: antialiased; background-color: white; border: 0px; box-sizing: inherit; font-size: 15px; margin-left: 30px; min-height: 19px; overflow-wrap: break-word; padding: 0px; text-size-adjust: none; vertical-align: top;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;&quot;&gt;This driver has been blocked from loading&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-font-smoothing: antialiased; background-color: white; border: 0px; box-sizing: inherit; font-size: 15px; margin-left: 30px; min-height: 19px; overflow-wrap: break-word; padding: 0px; text-size-adjust: none; vertical-align: top;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;&quot;&gt;Error code: 1275&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-font-smoothing: antialiased; background-color: white; border: 0px; box-sizing: inherit; font-size: 15px; margin-left: 30px; min-height: 19px; overflow-wrap: break-word; padding: 0px; text-size-adjust: none; vertical-align: top;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-font-smoothing: antialiased; background-color: white; border: 0px; box-sizing: inherit; margin-left: 30px; min-height: 19px; overflow-wrap: break-word; padding: 0px; text-size-adjust: none; vertical-align: top;&quot;&gt;
... then&amp;nbsp;&lt;a href=&quot;https://answers.microsoft.com/en-us/insider/forum/all/bios-update-dell-vostro-1510/ce9b2bcb-f89b-4eae-9933-33aa6483a780&quot;&gt;you&#39;re not alone&lt;/a&gt;.&amp;nbsp;&lt;/div&gt;
&lt;div style=&quot;-webkit-font-smoothing: antialiased; background-color: white; border: 0px; box-sizing: inherit; margin-left: 30px; min-height: 19px; overflow-wrap: break-word; padding: 0px; text-size-adjust: none; vertical-align: top;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-font-smoothing: antialiased; background-color: white; border: 0px; box-sizing: inherit; margin-left: 30px; min-height: 19px; overflow-wrap: break-word; padding: 0px; text-size-adjust: none; vertical-align: top;&quot;&gt;
Here&#39;s what I tried that&amp;nbsp;&lt;i&gt;didn&#39;t&lt;/i&gt;&amp;nbsp;work:&lt;/div&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strike&gt;&lt;b&gt;Booting from a Windows 7 universal install disc&lt;/b&gt;&lt;/strike&gt;. Trying to run PHLASH threw the error &quot;the subsystem needed to support the image type is not present&quot;. I suspect this is because the install disc is primarily 64-bit, but PHLASH is 32-bit, but that&#39;s just a guess.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;strike&gt;Installing 64-bit Windows 7&lt;/strike&gt;&lt;/b&gt;. The driver wouldn&#39;t load, throwing &quot;Access is denied&quot; in PHLASH.LOG, even when running as true Administrator. My theory is that this is because a newer kind of library or approach is needed by Windows 7 to write to the BIOS while Windows is loaded, and newer versions of the OS block the old method.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;strike&gt;Installing Windows XP&lt;/strike&gt;&lt;/b&gt;. I couldn&#39;t find a version that had a variant of the offline algorithm used to validate the license key that recognized the key that the laptop actually shipped with. If I&#39;d figured out how to do this, I suspect that it might have worked.&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;
What&amp;nbsp;&lt;i&gt;did&amp;nbsp;&lt;/i&gt;work was to&amp;nbsp;&lt;b&gt;boot from a 32-bit Windows&amp;nbsp;&lt;u&gt;Vista&lt;/u&gt;&amp;nbsp;install/rescue CD&lt;/b&gt;. PHLASH was able to successfully run from there.&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Digging up an ancient&amp;nbsp;&lt;a href=&quot;https://en.wikipedia.org/wiki/BartPE&quot;&gt;BartPE&lt;/a&gt;&amp;nbsp;might also work.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Updating the BIOS didn&#39;t fix my actual problem (some of the Neverware CloudReady menus are entirely black, as if there&#39;s some kind of video-driver overlay problem).&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
But at least this Inspiron 1501 now has a 2008 BIOS instead of a 2005 one. &quot;I&#39;m doing my part!&quot;&lt;/div&gt;
</description><link>http://roycebits.blogspot.com/2020/05/if-you-happen-to-be-turning-old-laptops.html</link><author>noreply@blogger.com (Royce Williams (TychoTithonus))</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6835589.post-998684818185730568</guid><pubDate>Sun, 20 Oct 2019 02:36:00 +0000</pubDate><atom:updated>2019-10-19T21:17:00.968-08:00</atom:updated><title>TIL: the unexpected back story of Mah Nà Mah Nà</title><description>&lt;div style=&quot;background-color: white; color: #222222; font-family: Arial, Helvetica, sans-serif; font-size: small;&quot;&gt;
Just read &lt;a href=&quot;https://en.wikipedia.org/wiki/Mah_N%C3%A0_Mah_N%C3%A0&quot;&gt;the Wikipedia article&lt;/a&gt;&amp;nbsp;and &lt;a href=&quot;https://slate.com/culture/2011/11/mahna-mahna-how-a-ditty-from-a-soft-core-italian-movie-became-the-muppets-catchiest-tune.html&quot;&gt;the 2011 Slate piece&lt;/a&gt;.&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #222222; font-family: Arial, Helvetica, sans-serif; font-size: small;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #222222; font-family: Arial, Helvetica, sans-serif; font-size: small;&quot;&gt;
... and then enjoy them:&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #222222; font-family: Arial, Helvetica, sans-serif; font-size: small;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #222222; font-family: Arial, Helvetica, sans-serif; font-size: small;&quot;&gt;
&lt;a href=&quot;https://www.youtube.com/watch?v=bBPnRh9U8ZE&quot;&gt;The original, &quot;Mah Nà Mah Nà&quot;&lt;/a&gt;, from the 1966 Italian movie &quot;&lt;a href=&quot;https://en.wikipedia.org/wiki/Sweden:_Heaven_and_Hell&quot;&gt;Svezia, inferno e paradiso&lt;/a&gt;&quot; (&quot;Sweden: Heaven and Hell&quot;)&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #222222; font-family: Arial, Helvetica, sans-serif; font-size: small;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #222222; font-family: Arial, Helvetica, sans-serif; font-size: small;&quot;&gt;
The original &lt;a href=&quot;https://www.youtube.com/watch?v=gsjcb7w1Y-w&quot;&gt;1969 Sesame Street version&lt;/a&gt;&amp;nbsp;(video)&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #222222; font-family: Arial, Helvetica, sans-serif; font-size: small;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #222222; font-family: Arial, Helvetica, sans-serif; font-size: small;&quot;&gt;
The &lt;a href=&quot;https://www.youtube.com/watch?v=kV-rWFlaGHc&quot;&gt;1971 Benny Hill version&lt;/a&gt;&amp;nbsp;(audio only)&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #222222; font-family: Arial, Helvetica, sans-serif; font-size: small;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #222222; font-family: Arial, Helvetica, sans-serif; font-size: small;&quot;&gt;
&lt;a href=&quot;https://www.youtube.com/watch?v=9ytei6bu7kQ&quot;&gt;The version from 101st episode of the Muppet Show&lt;/a&gt;&amp;nbsp;(video)&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #222222; font-family: Arial, Helvetica, sans-serif; font-size: small;&quot;&gt;
&lt;br /&gt;
&lt;a href=&quot;https://www.youtube.com/watch?v=6GZqcN_n9XQ&quot;&gt;The 2011 Muppets Tonight sketch parody, featuring Sandra Bullock&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;https://muppet.fandom.com/wiki/Mah_Na_Mah_Na&quot;&gt;The entry on the Muppet Wiki&lt;/a&gt;&amp;nbsp;- many, many differnent versions and references&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #222222; font-family: Arial, Helvetica, sans-serif; font-size: small;&quot;&gt;
(Interestingly, the scat sequences actually vary from version to version, borrowing from a variety of musical sequences.)&lt;/div&gt;
</description><link>http://roycebits.blogspot.com/2019/10/til-unexpected-back-story-of-mah-na-mah.html</link><author>noreply@blogger.com (Royce Williams (TychoTithonus))</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6835589.post-7281608577716405057</guid><pubDate>Sat, 31 Aug 2019 22:57:00 +0000</pubDate><atom:updated>2019-08-31T14:57:09.996-08:00</atom:updated><title>Notes on passphrases as passwords</title><description>&lt;p&gt;As we promote passphrases, we need to make it clear that not all phrases are created equal.&lt;/p&gt;

&lt;p&gt;Phrases that match the rhythm of human language, and phrases that are even only somewhat based on anything that has already appeared anywhere -- lyrics, song titles, movie quotes, phrases that appear on Wikipedia, etc. -- are subject to guessing. The password cracking community is hot on this trail, and really pushing the envelope in this area.  &quot;Myd0ghasfle@s!&quot; is certainly better than &quot;abcdefgh&quot; or &quot;Summer2015!&quot;, but it is not sufficiently resistant to state-of-the art attacks.  These attacks can quickly combine phrase lists with transformational rules, and really tap into the psychology of how people select naive passphrases.&lt;/p&gt;

&lt;p&gt;Put another way ... we need to make sure that users do not walk away thinking that &quot;itsmypartyandillcryifiwantto&quot; is a good passphrase.&lt;/p&gt;

&lt;p&gt;One problem is the word &quot;passphrase&quot;.  The layperson expects something called a &quot;passphrase&quot; to be a real, grammatically correct phrase, but that&#39;s exactly what we don&#39;t want them to use.  Such phrases are inherently easier to guess.  Only randomly-selected words provide resistance to both brute force and rules-based attacks.&lt;/p&gt;

&lt;p&gt;The best balance of &quot;memorizability&quot; and strength is to use &quot;Diceware&quot;-style passphrases, just as that XKCD suggested (but perhaps with some adjustments to the size of the word pool and number of words).  The words need to be truly randomly selected, and drawn from a relatively large pool of words that are nevertheless familiar enough to be easily remembered.  An open-source, client-side, JavaScript implementation is available &lt;a href=&quot;https://grempe.github.io/diceware/&quot;&gt;here&lt;/a&gt;, and some great statistics about the strength of the resulting passwords are shown there.&lt;/p&gt;

&lt;p&gt;The sheer numbers behind Diceware-style passphrases are significant.  When implemented correctly, even if I tell you which dictionary I&#39;ve drawn from, and how many  words that I used, brute-force cracking is still infeasible for any modern (and even many retired/outdated) password hashing methods.&lt;/p&gt;

&lt;p&gt;One implementation hitch is that many sites either A) still apply naive complexity requirements to very long passwords, or B) don&#39;t allow passwords longer than a certain length.&lt;/p&gt;

&lt;p&gt;To make Diceware-style passphrases compatible with naive complexity rules, users can add their own additional rule.  Such a rule can make randomly generated passphrases compliant with such complexity rules.  For example, I can always capitalize the first word, and appending &quot;1!&quot; at the end (&quot;Correct horse battery staple1!&quot;)  Even if I tell someone what my personal additional rule is, brute-force cracking is &lt;b&gt;still&lt;/b&gt; infeasible.&lt;/p&gt;

&lt;p&gt;If a website has an artificially low length cap (such as 15 or 20 characters), rather than trying to cram a shorter passphrase in, I recommend falling back to a randomly generated password that maxes out the allowed length, and storing it in a password manager.&lt;/p&gt;

&lt;p&gt;The best things that web developers can do to support good passphrases is to:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;relax complexity requirements once a sufficient length is met, and&lt;/li&gt;
&lt;li&gt;support a high maximum password length (such as 128 characters)&lt;/li&gt;
&lt;/ul&gt;
</description><link>http://roycebits.blogspot.com/2019/08/notes-on-passphrases-as-passwords.html</link><author>noreply@blogger.com (Royce Williams (TychoTithonus))</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6835589.post-4921467506235047053</guid><pubDate>Wed, 28 Oct 2015 13:30:00 +0000</pubDate><atom:updated>2015-10-28T05:30:01.061-08:00</atom:updated><title>Now with the SSLs</title><description>&lt;p&gt;This blog (along with &lt;a href=&quot;https://googleonlinesecurity.blogspot.com/2015/09/https-support-coming-to-blogspot.html&quot;&gt;all other blogspot.com blogs&lt;/a&gt;) is now available over HTTPS:&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://roycebits.blogspot.com/&quot;&gt;https://roycebits.blogspot.com/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The RSS and Atom feeds are also HTTPS-aware:&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://roycebits.blogspot.com/feeds/posts/default?alt=rss&quot;&gt;https://roycebits.blogspot.com/feeds/posts/default?alt=rss&lt;/a&gt;&lt;br/&gt;
&lt;a href=&quot;https://roycebits.blogspot.com/feeds/posts/default?alt=atom&quot;&gt;https://roycebits.blogspot.com/feeds/posts/default?alt=atom&lt;/a&gt;
&lt;/p&gt;

&lt;p&gt;Please update your bookmarks and feeds accordingly.&lt;/p&gt;

&lt;p&gt;Geek note: you can see &lt;a href=&quot;https://www.ssllabs.com/ssltest/analyze.html?d=roycebits.blogspot.com&quot;&gt;the Qualys SSL Labs Server Test results&lt;/a&gt; for this new setup. (Not perfect, but it&#39;s progress!)&lt;/p&gt;

&lt;p&gt;Note: HTTPS is not yet available when wrapping a blogspot.com blog within your own domain (such as blog.example.net).&lt;/p&gt;</description><link>http://roycebits.blogspot.com/2015/10/now-with-ssls.html</link><author>noreply@blogger.com (Royce Williams (TychoTithonus))</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6835589.post-1729319464270804616</guid><pubDate>Wed, 28 Oct 2015 03:09:00 +0000</pubDate><atom:updated>2016-08-19T20:39:23.475-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">passwords</category><category domain="http://www.blogger.com/atom/ns#">soapboxes</category><title>Hash filtering - an appeal to more than vanity</title><description>&lt;p&gt;
&lt;b&gt;tl;dr:&lt;/b&gt; The major password-cracking projects should add support for general hash substring search (vanity hashes, partial collisions, etc.).
&lt;/p&gt;

&lt;h4&gt;What is a vanity hash?&lt;/h4&gt;
&lt;p&gt;A &lt;em&gt;vanity hash&lt;/em&gt; is a hash that contains an interesting substring.  For example, my actual Bitcoin address is:
&lt;/p&gt;
&lt;p&gt;
&lt;tt&gt;1AzVVHTijMGoWzPtUJoWkF5u6vyS1NcTzj&lt;/tt&gt;
&lt;/p&gt;
&lt;p&gt;
But it would be cooler if it was this:
&lt;/p&gt;
&lt;p&gt;
&lt;tt&gt;&lt;strong&gt;1Royce&lt;/strong&gt;hyNKfRC4nN5jKruZpjMKwNviQRb&lt;/tt&gt;
&lt;/p&gt;
&lt;p&gt;
That&#39;s a vanity hash. Finding one requires a brute-force search. The more characters you want, the harder it gets -- exponentially harder. But even just a few characters can be good enough.
&lt;/p&gt;

&lt;h4&gt;Current examples of vanity hashes&lt;/h4&gt;
&lt;p&gt;
We humans are vain creatures -- so when hashes are used as public identifiers, we want to personalize them:
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Bitcoin addresses &lt;a href=&quot;https://www.google.com/search?pws=0&amp;q=bitcoin+vanity&quot;&gt;can be &quot;vanity addresses&quot;&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://github.com/lachesis/scallion&quot;&gt;Onion hashes and GPG keys&lt;/a&gt; can be vanity hashes.&lt;/li&gt;
&lt;li&gt;
&lt;a href=&quot;https://en.wikipedia.org/wiki/Imageboard#Tripcodes&quot;&gt;Tripcodes&lt;/a&gt; (used to prove identity on image boards) have
&lt;a href=&quot;https://github.com/DeepLearningJohnDoe/merikens-tripcode-engine&quot;&gt;vanity hash tools&lt;/a&gt; that can search for descrypt-like vanity hashes (at speeds in the 950Mh/s range!)
&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://github.com/bradfitz/gitbrute&quot;&gt;Git commit hashes&lt;/a&gt; can be &lt;a href=&quot;https://news.ycombinator.com/item?id=7543068&quot;&gt;vanity hashes&lt;/a&gt; if patched to support it.
&lt;li&gt;Some folks want to &lt;a href=&quot;http://security.stackexchange.com/questions/39362/&quot;&gt;personalize certificate signatures&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;

&lt;h4&gt;More than vanity&lt;/h4&gt;
&lt;p&gt;
Searching for a vanity hash is really just an attempt to find hashes with certain content. Other efforts seek hashes with specific content for other reasons - hash collisions, partial collisions, etc.  More generally, these are searches for hash &lt;em&gt;substrings&lt;/em&gt;.
&lt;/p&gt;

&lt;h4&gt;Why hash substring search is interesting&lt;/h4&gt;
&lt;p&gt;Finding substrings in hashes isn&#39;t just about vanity. Bringing hash substring search into the cracking platforms would enable other interesting work:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Experimenting with collisions and partial collisions&lt;/strong&gt;. This is a potential attack surface that is not adequately publicly explored.  Nation-states are almost certainly capable of locating near-collisions for some hashes. When you check a download hash, how often is that check only a cursory visual check?  True collisions for slow hashes are nigh-infeasible, of course -- but near-collisions may be interesting.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Demonstrating weaknesses&lt;/strong&gt;. For example, &lt;a href=&quot;http://www.asheesh.org/note/debian/short-key-ids-are-bad-news.html&quot;&gt;short GPG key IDs can have collisions&lt;/a&gt;.
&lt;li&gt;&lt;strong&gt;Filtering for hashes with broad properties (instead of just substrings)&lt;/strong&gt;. Hashes that contain only digits, or only letters, or letters and digits alternating, or only lower case (for hashes that distinguish case). Perhaps only a curiosity today, but they might be interesting in the future.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Automatic/loose discovery of similar strings&lt;/strong&gt;. This would be a nice-to-have at some point, but searching by &lt;a href=&quot;https://en.wikipedia.org/wiki/Edit_distance&quot;&gt;edit distance&lt;/a&gt; would complement substring searching nicely. A minimum or maximum edit distance could be specified to find strings that are &quot;close enough&quot;.  One of the most common measurements of edit distance is &lt;a href=&quot;https://en.wikipedia.org/wiki/Levenshtein_distance&quot;&gt;Levenshtein distance&lt;/a&gt;, which has been &lt;a href=&quot;http://rosettacode.org/wiki/Levenshtein_distance&quot;&gt;implemented in most languages&lt;/a&gt;, and &lt;a href=&quot;http://dl.acm.org/citation.cfm?id=2597677&quot;&gt; implemented efficiently on GPU&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Working with non-contiguous substrings&lt;/strong&gt;. Most vanity-hashing tools won&#39;t let you search for a hash that begins with &quot;[aA][bB][lL][eE]&quot; and ends with &quot;[eE][lL][bB][aA]&quot;. But password crackers&#39; mask syntax is perfect for this.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Unforeseeable innovation&lt;/strong&gt;. Once this capability is available across all hash types, people will tinker with it, revealing new use cases. I&#39;ve seen some CTFs that involve searching for specific substrings in hashes. I think they&#39;re on to something.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Calling them &quot;vanity hashes&quot; doesn&#39;t do justice to the potential. I think that the activity of hash substring search -- partial collisions, vanity hashes, etc. -- needs a better name.&lt;/p&gt;
&lt;p&gt;Let&#39;s call it &lt;em&gt;hash filtering&lt;/em&gt;.&lt;/p&gt;

&lt;h4&gt;Why the password crackers are the best place to do hash filtering&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;It&#39;s efficient&lt;/strong&gt;. No one is better positioned to implement hash filtering than the password crackers -- and doing it anywhere else is a waste of resources.  Each standalone vanity-search implementation reinvents the hash bruteforcing wheel - usually poorly: This rarely approaches the speeds that JtR and hashcat are capable of (though &lt;a href=&quot;https://github.com/DeepLearningJohnDoe/merikens-tripcode-engine&quot;&gt;there are exceptions&lt;/a&gt;). The Bitcoin folks have an edge today because of FPGAs, but I &lt;a href=&quot;http://www.openwall.com/presentations/Passwords13-Energy-Efficient-Cracking/&quot;&gt;expect this gap to close&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;It&#39;s high leverage&lt;/strong&gt;. If implemented as a general framework within password crackers, all current and future hash types automatically inherit substring search capability, with little additional effort.&lt;/li&gt;
&lt;/ul&gt;

&lt;h4&gt;How the password crackers might respond&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Sound great!&lt;/strong&gt; That would be awesome, but not likely to be the first reaction. So ...&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;OK -- but it should be done as a separate executable&lt;/strong&gt;. This is a waste of time. The best features of professional-grade password crackers -- core brute-force power, Markov, forking/parallelism, session management, masks, device selection, wordlist management, etc. -- would either be unnecessarily duplicated, left out, or suffer from &lt;a href=&quot;https://en.wikipedia.org/wiki/Software_rot&quot;&gt;bit rot&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;No. It will slow down cracking too much&lt;/strong&gt;. Not necessarily. Hash filtering should be implemented as an early pre-optimization step, so that you only have to take the inevitable speed hit &lt;em&gt;if you want hash filtering&lt;/em&gt;. Regular cracking would be unaffected.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;No. We&#39;re not interested in vanity hashing as a concept&lt;/strong&gt;. That would be a mistake. Vanity hashing is already driving interest, contribution -- and even innovation (like &lt;a href=&quot;https://github.com/DeepLearningJohnDoe/SLUT&quot;&gt;entirely new S-boxes&lt;/a&gt;).&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;No. It might attract noobs&lt;/strong&gt;. Unavoidable -- but this should be offset by &lt;a href=&quot;https://github.com/DeepLearningJohnDoe/merikens-tripcode-engine&quot;&gt;an influx of insight and talent&lt;/a&gt;. Also, we have to feed a certain number of noobs to &lt;a href=&quot;https://twitter.com/xanadrel&quot;&gt;Xanadrel&lt;/a&gt;, the &lt;a href=&quot;https://en.wikipedia.org/wiki/Sarlacc&quot;&gt;Sarlacc&lt;/a&gt; of &lt;a href=&quot;http://webchat.freenode.net/?channels=hashcat&quot;&gt;#hashcat&lt;/a&gt;. ;)&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;No. It adds complexity&lt;/strong&gt;. Technically true, but it should be a largely one-time cost. Also, I think that &lt;a href=&quot;http://dl.acm.org/citation.cfm?id=2597677&quot;&gt;implementing Levenshtein distance on GPU&lt;/a&gt; would be kinda fun if I was atom or Sayantan. ;)&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;No. Hash filtering itself will be too slow&lt;/strong&gt;. By its nature, it will, indeed, be much slower than password cracking.  But if it can be pre-optimized (see previous point), then it can take advantage of the rest of the cracking support structure, so that hash filtering will be faster, more portable, and easier to use &lt;em&gt;than it would be anywhere else&lt;/em&gt;. &lt;/li&gt;
&lt;/ul&gt;

&lt;h4&gt;Implementation suggestions&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;Allow the user to specify a &quot;hash filter&quot;, using existing mask syntax. This would automatically enable specifying one or more desired substrings anywhere in the hash -- beginning, end, or middle -- as well as both non-contiguous strings and loose matching by character set.&lt;/li&gt;
&lt;li&gt;On the command line, consider long options with names like &lt;tt&gt;--hash-filter [mask]&lt;/tt&gt; and &lt;tt&gt;--edit-distance [integer]&lt;/tt&gt;.  Or name it something else -- but keep it consistent across projects.&lt;/li&gt;
&lt;li&gt;Implement in the pre-optimization pass, so that the slowdown introduced by examining each hash will only kick in when hash filtering is explicitly requested.&lt;/li&gt;
&lt;li&gt;Add simple sanity checking. If the user supplies a mask that is longer than the target hash, warn rather than silently truncating. Also, warn if the user wants to filter for a mask that isn&#39;t possible (for example, if their descrypt filter&#39;s last character is not within [.26AEIMQUYcgkosw]).&lt;/li&gt;
&lt;/ul&gt;

&lt;h4&gt;Potential bounty?&lt;/h4&gt;
&lt;p&gt;
If this proposal is not obviously compelling, I will consider setting up a bounty (or charitable donation of the winner&#39;s choosing).  The bounty would go to each major natively Linux-based project (John the Ripper or hashcat) that incorporates hash filtering. Edit distance would be optional.
&lt;/p&gt;
&lt;p&gt;
If you want to go in on a bounty, &lt;a href=&quot;mailto:royce@techsolvency.com&quot;&gt;contact me&lt;/a&gt; and I&#39;ll do the &lt;a href=&quot;https://www.bountysource.com/&quot;&gt;Bountysource&lt;/a&gt; setup.
&lt;/p&gt;

&lt;h4&gt;The ask&lt;/h4&gt;
&lt;p&gt;Bring vanity hashing and its kin into the fold -- generalize it into hash filtering that can be applied to all current and future hashes. I think that the results will bear interesting fruit.
&lt;/p&gt;
&lt;p&gt;Updated: to use a valid example Bitcoin vanity.&lt;/p&gt;</description><link>http://roycebits.blogspot.com/2015/10/hash-filtering-more-than-vanity.html</link><author>noreply@blogger.com (Royce Williams (TychoTithonus))</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6835589.post-7417079405950353001</guid><pubDate>Wed, 21 Oct 2015 02:48:00 +0000</pubDate><atom:updated>2015-10-20T18:48:53.610-08:00</atom:updated><title>Cyber and information security certification frequency in job descriptions - 2015-10 edition</title><description>&lt;p&gt;A rough study of &lt;a href=&quot;http://www.indeed.com/&quot;&gt;Indeed&lt;/a&gt; acronym frequency when coupled with the word &quot;security&quot;:&lt;/p&gt;

&lt;pre&gt;
CISSP  12859 ISC main
ITIL  7233 see also ITILv3 below (+162)
CISA  5374 ISACA auditor
CISM  3927 ISACA manager
CompTIA 2857 a+, security+, network+, etc
GIAC  2368 (any)
CEH  2329 EC-Council
GSE  1501 GIAC expert/advanced
SSCP  1328 ISC – CISSP “lite”
GCIH  1279 GIAC incident handling
CRISC  804 ISACA risk
“CCNA Security” 660 Cisco
GPEN  554 GIAC pentester
OSCP  475 Offensive Security
GSLC  332 GIAC&#39;s CISSP analog
GWAPT  253 GIAC web pentest
“CCNP Security” 235 Cisco
CCSE  228 Checkpoint
GREM  219 GIAC reverse engineering malware
ITILv3  162 See also ITIL above (+7233)
“CCIE Security” 155 Cisco
GCFE  140 GIAC forensic examiner
OSCE  124 Offensive Security – advanced
CSIH  100 Carnegie Mellon
GXPN  73 GIAC exploit dev and advanced pentest
GCWN  66 GIAC Windows security
“Cisco CSS” 29 Cybersecurity Specialist – hard to search for right
WCAN  4 Wireshark
&lt;/pre&gt;</description><link>http://roycebits.blogspot.com/2015/10/cyber-and-information-security.html</link><author>noreply@blogger.com (Royce Williams (TychoTithonus))</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6835589.post-6577463734935759504</guid><pubDate>Fri, 28 Aug 2015 16:26:00 +0000</pubDate><atom:updated>2019-08-18T09:11:35.824-08:00</atom:updated><title>No sense in wasting the heat and air movement</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEis_GzZvRDvwBKMwtabsW477hywh3UEP8LofohvOIVSpZ_s9Qs2Qkrli6y7hRKWQdgqo6zxD5T5TPIEGW7KGf-42BkMjQxgT-Z_76RniH7R7S2wJFewM8P5ZNPQixLVPf_oWCj6/s1600/20150112_091847%257Emod.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEis_GzZvRDvwBKMwtabsW477hywh3UEP8LofohvOIVSpZ_s9Qs2Qkrli6y7hRKWQdgqo6zxD5T5TPIEGW7KGf-42BkMjQxgT-Z_76RniH7R7S2wJFewM8P5ZNPQixLVPf_oWCj6/s320/20150112_091847%257Emod.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;p&gt;My 6x GTX 970 open-air password-cracking rig.&lt;/p&gt;

&lt;p&gt;Purpose:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;http://www.techsolvency.com/passwords/&quot;&gt;On-site password auditing&lt;/a&gt; under my consulting shingle, &lt;a href=&quot;http://www.techsolvency.com/&quot;&gt;Tech Solvency&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Independent password research&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Components:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Case: Custom &lt;a href=&quot;http://spotswoodcomputercases.com/wp/&quot;&gt;Spotswood&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;- Case cover: Not pictured. Mostly for transport purposes, usually runs with the cover off&lt;/li&gt;
&lt;li&gt;- Handle: For carrying. Sorta helpful, but a little unwieldy&lt;/li&gt;
&lt;li&gt;Board: &lt;a href=&quot;http://www.gigabyte.com/products/product-page.aspx?pid=4672#ov&quot;&gt;GA-990FXA-UD3 rev 4.0&lt;/a&gt;. Leave IOMMU enabled; add &quot;iommu=soft&quot; to grub parameters (otherwise, USB and NIC won&#39;t work)&lt;/li&gt;
&lt;li&gt;- Sound: No onboard sound - mini onboard speaker ($4)&lt;/li&gt;
&lt;li&gt;CPU: &lt;a href=&quot;http://www.amazon.com/gp/product/B009O7YUF6&quot;&gt;AMD FX-8350&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Memory: &lt;a href=&quot;http://www.amazon.com/gp/product/B00AZGZFF4&quot;&gt;32G&lt;/a&gt; for &lt;a href=&quot;https://hashcat.net/events/p14-trondheim/prince-attack.pdf&quot;&gt;PRINCE&lt;/a&gt; headroom&lt;/li&gt;
&lt;li&gt;OS: &lt;a href=&quot;https://wiki.ubuntu.com/TrustyTahr/ReleaseNotes&quot;&gt;Ubuntu Server 14.04 LTS&lt;/a&gt; 64-bit&lt;/li&gt;
&lt;li&gt;PSUs: 2x &lt;a href=&quot;http://www.amazon.com/gp/product/B00EB7UIZU&quot;&gt;Corsair RM1000&lt;/a&gt;. No fan movement unless loaded. Room for growth if cards get upgraded&lt;/li&gt;
&lt;li&gt;- Dual PSU adapter: &lt;a href=&quot;https://www.amazon.com/gp/product/B00J03RMAY/&quot;&gt;Vantacor&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;- Power switch: Had to get a &lt;a href=&quot;http://www.amazon.com/gp/product/B00H8S42QU&quot;&gt;power/reset switch/cable&lt;/a&gt; - none onboard&lt;/li&gt;
&lt;li&gt;GPUs: 6x &lt;a href=&quot;http://www.amazon.com/dp/B00NVODXR4&quot;&gt;EVGA 04G-P4-2974-KR&lt;/a&gt;. Max 165W per card&lt;/li&gt;
&lt;li&gt;- Risers: Non-USB (ribbon) risers. The four x16 slots have &lt;a href=&quot;http://www.amazon.com/gp/product/B00JJXP4UU&quot;&gt;powered x16-to-x16 ribbon risers&lt;/a&gt;, which isn&#39;t necessary for most GPU-centric cracking. x4 or higher is better for John the Ripper, but x1 is fine for cudaHashcat.  The two x1 slots have &lt;a href=&quot;http://www.amazon.com/gp/product/B008BZBGPO&quot;&gt;unpowered x1-to-x16 ribbon risers&lt;/a&gt;. The USB-based risers would *not* work with this board. The symptom was that only a couple of the cards would work at a time.&lt;/li&gt;
&lt;li&gt;- GPU fans: &lt;a href=&quot;https://sites.google.com/site/akohlmey/random-hacks/nvidia-gpu-coolness&quot;&gt;locked at 50%&lt;/a&gt;. Temperatures do not break 78 at normal house temps, and do not break 72 in cooler rooms&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Power consumption:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Idle: 105W&lt;/li&gt;
&lt;li&gt;Idle, with GPU fans forced to 50%: 120W&lt;/li&gt;
&lt;li&gt;Full CPU load (all 8 cores, OEM CPU fan at 3600 RPM): 265W&lt;/li&gt;
&lt;li&gt;No CPU, oclhashcat job loaded but paused: 310W&lt;/li&gt;
&lt;li&gt;Full GPU-only oclhashcat job in progress, minimal CPU: 1050W&lt;/li&gt;
&lt;li&gt;Full processing load (CPU and GPU): TBD&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;UPDATES - Performance:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;a href=&quot;https://gist.github.com/roycewilliams/77ef7f801973e6af104b&quot;&gt;cudaHashcat 2.01&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://gist.github.com/roycewilliams/ae7481ddef71e0d4fa566d9748d530bb&quot;&gt;unified hashcat 3.10b97 (g57ce1fd)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://gist.github.com/roycewilliams/45fa68f02aa966dae671b84d00cb080b&quot;&gt;hashcat 3.30 (2gf88644f, 2017-01)&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;

&lt;p&gt;UPDATE - upgrades over time:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;GPUs are now 6x 1080s&lt;/li&gt;&lt;li&gt;Ubuntu 18.04 LTS&lt;/li&gt;&lt;li&gt;CUDA 10.1 (upcoming hashcat 6.0 restores CUDA support; now you can use all of your GPU memory! - &lt;a href=&quot;https://www.pugetsystems.com/labs/hpc/How-To-Install-CUDA-10-together-with-9-2-on-Ubuntu-18-04-with-support-for-NVIDIA-20XX-Turing-GPUs-1236/&quot;&gt;good howto from Puget Systems here&lt;/a&gt;)&lt;/li&gt;&lt;li&gt;almost always latest hashcat from GitHub&lt;/li&gt;&lt;/ul&gt;</description><link>http://roycebits.blogspot.com/2015/08/no-sense-in-wasting-heat-and-air.html</link><author>noreply@blogger.com (Royce Williams (TychoTithonus))</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEis_GzZvRDvwBKMwtabsW477hywh3UEP8LofohvOIVSpZ_s9Qs2Qkrli6y7hRKWQdgqo6zxD5T5TPIEGW7KGf-42BkMjQxgT-Z_76RniH7R7S2wJFewM8P5ZNPQixLVPf_oWCj6/s72-c/20150112_091847%257Emod.jpg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6835589.post-1632028989445711822</guid><pubDate>Fri, 19 Jun 2015 13:34:00 +0000</pubDate><atom:updated>2015-06-19T05:34:13.175-08:00</atom:updated><title>The E-mail Productivity Curve</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEixc0PBoXg86glib92N_qZaR2ibva6_93sl2gH0oBkkeXG8sojr93yVgixcXWc3sSX_5I9MWzJQwzeSWZELkdz9UewaMg0xbr_rRmFOPHOms2b0M0NgD0pbTYtDK347uA0Awwuk/s1600/EmailProductivityCurve-600px.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;406&quot; width=&quot;600&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEixc0PBoXg86glib92N_qZaR2ibva6_93sl2gH0oBkkeXG8sojr93yVgixcXWc3sSX_5I9MWzJQwzeSWZELkdz9UewaMg0xbr_rRmFOPHOms2b0M0NgD0pbTYtDK347uA0Awwuk/s320/EmailProductivityCurve-600px.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Brilliant. Captures exactly why we hate email -- and why we love it.&lt;br /&gt;
&lt;br /&gt;
Via: &lt;a href=&quot;http://calnewport.com/blog/2015/06/18/the-e-mail-productivity-curve/&quot;&gt;The E-Mail Productivity Curve - Cal Newport&lt;/a&gt;</description><link>http://roycebits.blogspot.com/2015/06/the-e-mail-productivity-curve.html</link><author>noreply@blogger.com (Royce Williams (TychoTithonus))</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEixc0PBoXg86glib92N_qZaR2ibva6_93sl2gH0oBkkeXG8sojr93yVgixcXWc3sSX_5I9MWzJQwzeSWZELkdz9UewaMg0xbr_rRmFOPHOms2b0M0NgD0pbTYtDK347uA0Awwuk/s72-c/EmailProductivityCurve-600px.jpg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6835589.post-3295011107557314759</guid><pubDate>Fri, 06 Feb 2015 20:00:00 +0000</pubDate><atom:updated>2015-02-06T11:00:36.631-09:00</atom:updated><title>The origins of the Olaf card</title><description>&lt;div style=&quot;margin-bottom: 0in;&quot;&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
Late one night, I was telling my friend
Sam that I had recently run into a panhandler who was deaf, and who
communicated via a stock message on a business-sized card.  Having
someone wordlessly hand you a card was a strangely powerful
experience.  Sam and I immediately started thinking of alternate
messages that could be conveyed with this new medium.  Somehow, we
latched on to the idea of a total stranger using it to ask people to
tickle them.  And it would be even funnier if English wasn&#39;t their
first language.  This quickly evolved into a large, friendly
Norwegian man, asking to be tickled:&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgIX9cPgRazUu77M6lYp15okyxZKRwXw_B_YWTnYOfnTzSkpW-VJ7yZkg8oFal5aZCtwoYjG4suZdQ97VfkxASnLRrPzMfo6EUxvecssDg6-FQVGoUqt9rPEFx5aIOGEE0tcQIg/s1600/olaf.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgIX9cPgRazUu77M6lYp15okyxZKRwXw_B_YWTnYOfnTzSkpW-VJ7yZkg8oFal5aZCtwoYjG4suZdQ97VfkxASnLRrPzMfo6EUxvecssDg6-FQVGoUqt9rPEFx5aIOGEE0tcQIg/s1600/olaf.jpg&quot; height=&quot;190&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;i&gt;(&quot;Hello, My name is Olaf. I am recently from Norway and do not speak the English good. Please tickle me. Thank you.&quot;) &amp;nbsp;&lt;/i&gt;&lt;br /&gt;
&lt;span style=&quot;font-style: normal;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-style: normal;&quot;&gt;The
idea wa&lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;s to &lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;walk
up to a total stranger and hand &lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;them
&lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;the card– without saying a
single word.  The wordlessness is a crucial element. &lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;Y&lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;our
initial communication with the person is &lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;solely
&lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;through the card – and your
friendly, hopeful facial expression.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
We laughed until our
sides hurt.&lt;/div&gt;
&lt;div style=&quot;margin-bottom: 0in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: 0in;&quot;&gt;
Then, in classic Sam style, he &lt;b&gt;insisted&lt;/b&gt;
that we go to Kinko&#39;s &lt;i&gt;at once&lt;/i&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;
– at 1 o&#39;clock in the morning! – to have &lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;the
&lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;cards &lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;actually
&lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;printed.  &lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;My
friend Mike Hanscom was working &lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;at
that Kinko&#39;s, &lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;and was
&lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;delighted &lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;to
oblig&lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;e, &lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;c&lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;huckling
the whole time.  &lt;/span&gt;
&lt;/div&gt;
&lt;div style=&quot;margin-bottom: 0in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-style: normal;&quot;&gt;The
first run was 500 cards.  &lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;W&lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;e
burned through that one pretty quickly. The second run &lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;of
&lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;500 &lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;went
fast, too&lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;.  The fad faded in
the middle of the third batch, &lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;but
a few &lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;stories stand out.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: 0in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-style: normal;&quot;&gt;I have
almost never handed them to total strangers. Instead, I show them to
people whom I already know (or have just met), saying, “Pretend
like you don&#39;t know me, and I walk up to you without saying anything,
and &lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;I &lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;hand
you this card.”  &lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;Since I
look faintly Scandinavian, and I&#39;ve usually just met them, it&#39;s not
too much of a stretch – and it was a fun way to break the ice.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: 0in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-style: normal;&quot;&gt;But
&lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;Sam &lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;actually
&lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;took a batch of &lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;cards
&lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;to Cos&lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;tc&lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;o
&lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;to &lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;perform
a sociological experiment.  &lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;(I&lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;f
you don&#39;t know Sam, imagine a 6-foot-5 cross between Kyle MacLachlan
and Waldo from “Where&#39;s Waldo.”  &lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;When
&lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;he walks up to you as a total
stranger and hands you an Olaf card, you&#39;re going to pay attention. 
&lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;Sam &lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;handed
&lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;cards &lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;out
to people until the Costco folks asked him to leave.  &lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;H&lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;e
had enough data&lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt; &lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;to
identify &lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;three major
categories of respon&lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;se&lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;:&lt;/span&gt;&lt;/div&gt;
&lt;ul&gt;
&lt;li&gt;&lt;div style=&quot;margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-style: normal;&quot;&gt;85%
 of people would laugh, take the card, and keep walking.&lt;/span&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;&lt;div style=&quot;margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-style: normal;&quot;&gt;10-12%
 would immediately turn and go without any response at all –
 &lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;studiously making no eye
 contact.&lt;/span&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;&lt;div style=&quot;margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-style: normal;&quot;&gt;The
 remaining 3-5% would look at Sam furtively, look down at the card,
 look at Sam again … and then reach out very gingerly, tickle him
 &lt;/span&gt;&lt;i&gt;very &lt;/i&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;briefly, and
 then make a break for it. &lt;/span&gt;
 &lt;/div&gt;
&lt;div style=&quot;margin-bottom: 0in;&quot;&gt;
&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-style: normal;&quot;&gt;Sam&#39;s
theory was that this last group was afraid of what he would do &lt;/span&gt;&lt;i&gt;if
they didn&#39;t tickle hi&lt;/i&gt;&lt;i&gt;m&lt;/i&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: 0in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-style: normal;&quot;&gt;Sam
and I knew that we had struck some kind of chord when we took a road
trip to UAF and saw one taped to someone&#39;s dorm door – someone whom
neither of us knew.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: 0in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-style: normal;&quot;&gt;T&lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;he
&lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;largest &lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;distributor
was my friend Rod, who &lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;moved
to Tuscon and started &lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;hand&lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;ing&lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;
them out.  He would go out dancing &lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;in
&lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;his &lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;vintage
green &#39;70s leisure suit, giant afro wig, and big sunglasse&lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;s
...&lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt; and hand out &lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;Olaf
&lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;cards.  &lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;H&lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;e
went through an entire batch himself.  &lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;For
many in &lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;Tucson&lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;,
&lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;Rod is &lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;“Olaf.”&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: 0in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: 0in;&quot;&gt;
&lt;span style=&quot;font-style: normal;&quot;&gt;Rod
&lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;was &lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;also
&lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;a &lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;dinner
captain at a very nice steak restaurant in Tucson.  One night, Kevin
Spacey &lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;had been &lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;a
customer &lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;and was on his way
to the door when &lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;Rod
intercepted Spacey briefly and handed him &lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;an
Olaf &lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;card.  &lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;A&lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;s
&lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;Spacey &lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;was
walking away, &lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;o&lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;ut
of the corner of &lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;Rod&#39;s &lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;eye,
&lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;he &lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;saw
Spacey look down at the card, actually read it, &lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;chuckle&lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;,
and &lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;then &lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;put
it in his pocket.  &lt;/span&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;High
praise, indeed.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: 0in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: 0in;&quot;&gt;
To
this day, every once in a while, I&#39;ll get a “hey, you&#39;re the guy
who
handed out the Olaf
cards!”&lt;/div&gt;
</description><link>http://roycebits.blogspot.com/2015/02/the-origins-of-olaf-card.html</link><author>noreply@blogger.com (Royce Williams (TychoTithonus))</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgIX9cPgRazUu77M6lYp15okyxZKRwXw_B_YWTnYOfnTzSkpW-VJ7yZkg8oFal5aZCtwoYjG4suZdQ97VfkxASnLRrPzMfo6EUxvecssDg6-FQVGoUqt9rPEFx5aIOGEE0tcQIg/s72-c/olaf.jpg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6835589.post-6822500984156872204</guid><pubDate>Sun, 25 Jan 2015 23:52:00 +0000</pubDate><atom:updated>2015-01-25T14:52:23.461-09:00</atom:updated><title>Managing and optimizing lists of password masks</title><description>&lt;p&gt;I&#39;ve been working on some password-cracking research on the side. I thought I&#39;d come up with a cool new idea, but it turns out that &lt;a href=&quot;https://blog.korelogic.com/blog/2014/04/04/pathwell_topologies&quot;&gt;someone else already thought of it&lt;/a&gt;.

&lt;p&gt;It occurred to me last night that a big list of passwords could be abstracted out into their equivalent masks, and then a frequency count of those masks could be generated, which could then be exhausted in frequency order.&lt;/p&gt;

&lt;p&gt;First, I extracted a frequency count of character set combinations (masks) from all eight-characters-long&lt;a href=&quot;http://en.wikipedia.org/wiki/RockYou#Controversy&quot;&gt;the RockYou breach&lt;/a&gt;&#39;s password list, yielding a list of the form:&lt;/p&gt;

&lt;pre&gt;
100:hundredofthese
95: 95ofthese
[...]
2:justtwoofthese
1:onlyoneofthese
1:alsoonlyoneofthese
&lt;/pre&gt;

&lt;p&gt;... as follows:&lt;/p&gt;

&lt;pre&gt;
#!/bin/bash

echo &quot;- Getting frequency of character patterns from RockYou ...&quot;
time gunzip -cd rockyou.txt.gz \
        | tr &#39;[:lower:]&#39; &#39;l&#39; \
        | tr &#39;[:upper:]&#39; &#39;u&#39; \
        | tr &#39;[:digit:]&#39; &#39;d&#39; \
        | tr &quot;[\ !\&quot;#$%amp;&amp;\&#39;()*+,-./:;&amp;lt;=&amp;gt;?@\[\\\]^_\`{|}~]&quot; &#39;s&#39; \
        | sed &#39;s/[^luds]/a/g&#39; \
        | strings \
        | cut -b1-8 \
        | freqcount \
        &gt; rockyou.freq.8a
wc -l rockyou.freq.8a
head rockyou.freq.8a

echo &quot;- Generate masks.&quot;
echo &quot;- Ignoring all masks with more than three consecutive &#39;a&#39; charset.&quot;
time cat rockyou.freq.8a \
        | cut -d\: -f2 \
        | sed &#39;s/l/?l/g;s/u/?u/g;s/d/?d/g;s/s/?s/g;s/a/?a/g&#39; \
        | egrep -v &#39;aaaa&#39; \
        &gt; rockyou.masks.8
wc -l rockyou.masks.8
head rockyou.masks.8

echo &quot;- Done.&quot;
#end of script
&lt;/pre&gt;

&lt;p&gt;Next, I wrote a script to exhaust each one in order by frequency using hashcat:&lt;/p&gt;

&lt;pre&gt;
#!/bin/bash

for mymask in `rockyou.masks.8`; do
        echo &quot;- Running mask: $mymask ...&quot;
        cudaHashcat64.bin -a 3 -m 1500 \
                target-hashes.list \
                $mymask
        echo &quot;$mymask: done - `date`&quot; &gt;&gt; $0.log
done
#end of script
&lt;/pre&gt;

&lt;p&gt;
Then it occurred to me that if someone else had published this info, and had used real corpora of passwords as the input, then our frequency lists would probably look similar.  So I did the following Google search:&lt;/p&gt;

&lt;pre&gt;&quot;?l?l?l?d?d?d?d&quot; &quot;?l?l?l?l?l?d?d?d&quot;&lt;/pre&gt;

&lt;p&gt;
... and the first hit was &lt;a href=&quot;https://blog.korelogic.com/blog/2014/04/04/pathwell_topologies&quot;&gt;the KoreLogic blog post&lt;/a&gt;.

&lt;p&gt;Dangit! :-)  But at least I&#39;m catching up to the state of the art; the KoreLogic article was published in April 2014. :-)&lt;/p&gt;

&lt;p&gt;
I got the idea from work I had done on some license-plate-collecting stuff I do on the side.  I thought of it for capturing high-level patterns in serials, so that people can search for a plate based on the serial.  A plate with &quot;BDT 606&quot; on it would match any plate whose serial &quot;mask&quot; is &quot;AAA 999&quot; using my notation. (I then match more closely, but it&#39;s used for a high-level search first).&lt;/p&gt;

&lt;p&gt;I haven&#39;t watched the KoreLogic presentation yet, but I can definitely improve upon my own approach, because I&#39;m being overly aggressive in turning then entire set of non-alphanumeric-but-printable characters into &#39;s&#39;:&lt;/p&gt;

&lt;pre&gt;
        | tr &quot;[\ !\&quot;#$%&amp;\&#39;()*+,-./:;&lt;=&gt;?@\[\\\]^_\`{|}~]&quot; &#39;s&#39; \
&lt;/pre&gt;

&lt;p&gt;
... when most folks use the simple ones (#$%@, etc.)  I could create a custom charset for this using the notation as noted &lt;a href=&quot;http://hashcat.net/wiki/doku.php?id=mask_attack&quot;&gt;here&lt;/a&gt; ... and then turn the remaining characters into another custom charset that is the remaining characters.
&lt;/p&gt;
&lt;p&gt;I then found &lt;a href=&quot;https://thesprawl.org/projects/pack/&quot;&gt;PACK - the Password Analysis and Cracking Kit&lt;/a&gt;, which is is a set of Python scripts to manage masks, including optimizing a set of masks based on a given timeframe (or, &quot;I have 24 hours. Which masks should I use to maximize how many passwords I can crack?&quot;)&lt;/p&gt;</description><link>http://roycebits.blogspot.com/2015/01/managing-and-optimizing-lists-of.html</link><author>noreply@blogger.com (Royce Williams (TychoTithonus))</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6835589.post-4468417443578792474</guid><pubDate>Sun, 25 Jan 2015 23:43:00 +0000</pubDate><atom:updated>2016-10-16T14:14:06.582-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">bsd</category><category domain="http://www.blogger.com/atom/ns#">freebsd</category><category domain="http://www.blogger.com/atom/ns#">geek</category><title>FreeBSD LSI SAS9211-8i HBA firmware notes</title><description>&lt;p&gt;I&#39;ll be using this post to store information about LSI HBA firmware, with a focus on FreeBSD (but also drawing upon Linux information). It may also be useful for users of FreeNAS, PC-BSD, unRAID, Nexenta, or ZFSguru.&lt;/p&gt;

&lt;h2&gt;Why - SATA port density on a budget&lt;/h2&gt;
&lt;p&gt;If you are using ZFS, you do not need RAID -- you just need lots of fast SATA ports.  To maximize the features of ZFS, it needs to directly access attached drives in JBOD mode rather than as RAID.  If you can afford them, you can buy &lt;a href=&quot;http://www.lsi.com/products/host-bus-adapters/pages/lsi-sas-9211-8i.aspx&quot;&gt;the LSI 9211-8i HBA card&lt;/a&gt;.  Alternatively, you can also buy a less expensive card, and then replace its stock &quot;IR&quot; (Initiator-RAID) firmware by &quot;crossflashing&quot; to an &quot;IT&quot; (Initiator-Target) version of &lt;a href=&quot;http://www.lsi.com/products/host-bus-adapters/pages/lsi-sas-9211-8i.aspx#tab/tab4&quot;&gt;LSI&#39;s general firmware for 9211-8i hardware&lt;/a&gt;.  This option is useful for people building home NAS systems on a budget. Popular cards include the Dell PERC H200 and the IBM ServeRAID M1015. &lt;a href=&quot;http://www.servethehome.com/ibm-serveraid-m1015-part-4/&quot;&gt;This ServeTheHome post introduces the topic well&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Here is the relevant dmesg for a Dell PERC H200 Internal (H200I) under FreeBSD 8.4-RELEASE. (Note that this particular card&#39;s LSI firmware (Phase 9) is out of sync with the FreeBSD driver (Phase 14), which may have unexpected side effects. The system was initially built as a FreeBSD 8.1-RELEASE system in 2010.)&lt;/p&gt;
&lt;pre&gt;
$ uname -r
8.4-RELEASE-p19
$ egrep ^mps0 /var/run/dmesg.boot
mps0: &amp;lt;LSI SAS2008&amp;gt; port 0xc000-0xc0ff mem 0xfb3b0000-0xfb3bffff,0xfb3c0000-0xfb3fffff irq 16 at device 0.0 on pci3
mps0: Firmware: 09.00.00.00, Driver: 14.00.00.01-fbsd
mps0: IOCCapabilities: 1285c&amp;lt;ScsiTaskFull,DiagTrace,SnapBuf,EEDP,TransRetry,EventReplay,HostDisc&amp;gt;
mps0: [ITHREAD]
&lt;/pre&gt;

&lt;h2&gt;General flashing tips&lt;/h2&gt;
&lt;p&gt;Before flashing, and especially before erasing any flash, use the &lt;tt&gt;sas2flsh.exe -listall&lt;/tt&gt; option to note the SAS ID of your device (usually beginning with &quot;0x590&quot;). If you accidentally erase the entire flash (&lt;tt&gt;sas2flsh.exe -o -e 6&lt;/tt&gt; will retain your SAS ID, but &lt;tt&gt;sas2flsh.exe -o -e 7&lt;/tt&gt; will wipe it), you will not be able to re-flash the device unless you have this ID. &lt;strong&gt;Write it down&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;Some earlier versions of &lt;tt&gt;sas2flsh.exe&lt;/tt&gt; allow cards to be flashed from IR firmware to IT firmware; others do not.  I and others have had luck with the one that comes with LSI&#39;s Phase 7 (AKA P7 or P07) firmware. (Try &lt;a href=&quot;http://docs.avagotech.com/docs-and-downloads/host-bus-adapters/host-bus-adapters-common-files/sas_sata_6g_p7_Firmware_BIOS_Upgrade_on_MSDOS_and_Windows.zip&quot;&gt;this link&lt;/a&gt;, or search LSI.com for &quot;9211_8i_Package_For_P7_Firmware_BIOS_Upgrade_on_MSDOS_and_Windows&quot; to download the package that contains this version of &lt;tt&gt;sas2flsh.exe&lt;/tt&gt;.&lt;/p&gt;
&lt;p&gt;To flash the firmware on cards installed in non-UEFI motherboards, you can create a DOS-bootable USB key using a tool like &lt;a href=&quot;https://rufus.akeo.ie/&quot;&gt;Rufus&lt;/a&gt;. Rufus will make the device bootable with &lt;a href=&quot;http://www.freedos.org/&quot;&gt;FreeDOS&lt;/a&gt; or MS-DOS (well, actually, Windows ME!). I &lt;a href=&quot;http://lime-technology.com/forum/index.php?topic=34212.0&quot;&gt;and others&lt;/a&gt; have had better luck using the MS-DOS option. (According to that thread, LSI themselves recommend MS-DOS rather than FreeDOS).&lt;/p&gt;
&lt;p&gt;Also note that when flashing using &lt;tt&gt;sas2flsh.exe&lt;/tt&gt; there are two different components to be flashed: the firmware (contained in a filename sometimes ending with &lt;tt&gt;.fw&lt;/tt&gt;, and usually named after the device in some way) and the BIOS (usually named something like &lt;tt&gt;MPTSAS2.ROM&lt;/tt&gt;). The firmware component is what your OS driver communicates with. The BIOS component allows you to configure the firmware at boot time, and can enumerate the list of attached hard drives. For ZFS and JBOD purposes, the BIOS is not strictly necessary, and has even been reported to cause problems when present.  Erasing the firmware areas &lt;tt&gt;sas2flsh.exe -o -e 6&lt;/tt&gt; and then just applying the firmware without the BIOS will also result in faster boot times.&lt;/p&gt;
&lt;p&gt;A common error that people get when flashing is &lt;a href=&quot;https://techmattr.wordpress.com/2014/06/13/failed-to-validate-mfg-page-2/&quot;&gt;&quot;Failed to Validate Mfg Page 2&quot;&lt;/a&gt;. This occurs when you try to flash to the LSI firmware without first erasing the firmware.  &lt;a href=&quot;https://techmattr.wordpress.com/tag/6gbps-hba/&quot;&gt;The techmattr blog&lt;/a&gt; has some good information.&lt;/p&gt;
&lt;p&gt;Phase 10 firmware or higher is needed for cards in this family (6GB/s HBSa) in order to support drives larger than 2GB. See &lt;a href=&quot;http://mycusthelp.info/LSI/_cs/AnswerPreview.aspx?sSessionID=&amp;inc=7947&quot;&gt;this LSI KB article&lt;/a&gt; (old version &lt;a href=&quot;https://web.archive.org/web/20121117043748/http://kb.lsi.com/KnowledgebaseArticle16399.aspx&quot;&gt;cached at the Internet Archive&lt;/a&gt;)&lt;/p&gt;

&lt;h2&gt;FreeBSD flashing considerations&lt;/h2&gt;
&lt;p&gt;At this writing (2015-01), there have been &lt;a href=&quot;http://www.newswebreader.com/muc.lists.freebsd.scsi/RE-MPS-driver-and-latest-firmware/1186&quot;&gt;reports&lt;/a&gt; of Phase 20 not playing well with FreeNAS and FreeBSD.  Downgrading to Phase 16 (FreeBSD 9.3 and 10.0) or Phase 19 (FreeBSD 10.1) is reported to be more stable.&lt;/p&gt;
&lt;p&gt;Under FreeBSD, PC-BSD, and FreeNAS, the desired end state is for the &quot;Firmware&quot; and &quot;Driver&quot; ports of the dmesg line to use identical firmware versions. For FreeBSD 10.1-RELEASE, this is the Phase 19 version.  In the &lt;tt&gt;dmesg&lt;/tt&gt; output, the &lt;tt&gt;Firmware&lt;/tt&gt; item is what&#39;s on the card, and the &lt;tt&gt;Driver&lt;/tt&gt; item is what the OS supplies.&lt;/p&gt;
&lt;pre&gt;
mps0: Firmware: 19.00.00.00, Driver: 19.00.00.00-fbsd
&lt;/pre&gt;
&lt;p&gt;In fact, &lt;a href=&quot;https://bugs.freenas.org/issues/6678&quot;&gt;FreeNAS will even complain if they are mismatched&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;(I also list all of the firmware/OS pairings I know of towards the end of this post.)&lt;/p&gt;
&lt;p&gt;Beware when upgrading a FreeBSD-based OS. Depending on the combination of firmware and driver, &lt;a href=&quot;https://lists.freebsd.org/pipermail/freebsd-scsi/2014-January/006202.html&quot;&gt;your drives may disappear&lt;/a&gt; from the OS&#39; view until you reflash. This can be especially troublesome if your root filesystem is ZFS.&lt;/p&gt;

&lt;h2&gt;How to reflash the Dell Internal Tape Adapter 15MCV card as a 9211-8i&lt;/h2&gt;
&lt;p&gt;There is a card from Dell that looks almost identical to the H200I card, but is actually a Dell Internal Tape Adapter board (Dell part number 15MCV). This is identified in various levels of firmware and utilities as &quot;Int Tape Adapter&quot; or &quot;IntTapeAdptr&quot;, and identified under Linux as:&lt;/p&gt;
&lt;pre&gt; Vendor(0x1000), Device(0x0072), SSVID(0x1028), SSDID(0x1F22)&lt;/pre&gt;
&lt;p&gt;Cards labeled as &quot;H200&quot; on eBay are sometimes actually these cards instead. Unfortunately, &lt;a href=&quot;http://lime-technology.com/forum/index.php?topic=36516.0&quot;&gt;the usual methods for flashing to generic LSI drivers do not work for the Tape Adapter boards&lt;/a&gt;. But &lt;a href=&quot;http://hardforum.com/showpost.php?p=1040649147&amp;amp;postcount=27&quot;&gt;as discovered by Hardforum user lamune in this post&lt;/a&gt;, if you start from &lt;a href=&quot;http://www.dell.com/support/home/us/en/19/Drivers/DriversDetails?driverId=NMP3N&quot;&gt;the original Dell Internal Tape Adapter firmware&lt;/a&gt;, and then, &lt;strong&gt;without erasing the current firmware&lt;/strong&gt;, flash using &lt;a href=&quot;ftp://ftp.supermicro.com/driver/SAS/LSI/2008/IR_IT/Firmware/IT/&quot;&gt;Supermicro HBA drivers&lt;/a&gt; (Phase 16 at this writing) as an intermediate step, you can then flash to the LSI firmware.&lt;/p&gt;
&lt;p&gt;Here is the Linux dmesg for my Internal Tape Adapter board, prior to being cross-flashed. Note that capabilities include RAID, and the BIOS has a standard version (07.11.10.00):&lt;/p&gt;
&lt;pre&gt;
$ dmesg | egrep -i &#39;lsi|mpt|mps|sas&#39;
[    0.000000]   HighMem  empty
[    5.722377] mpt2sas version 16.100.00.00 loaded
[    5.731608] scsi4 : Fusion MPT SAS Host
[    5.739575] mpt2sas0: 32 BIT PCI BUS DMA ADDRESSING SUPPORTED, total mem (497212 kB)
[    5.739643] mpt2sas 0000:01:00.0: irq 43 for MSI/MSI-X
[    5.739682] mpt2sas0-msix0: PCI-MSI-X enabled: IRQ 43
[    5.739686] mpt2sas0: iomem(0x00000000dfcb0000), mapped(0xe0280000), size(65536)
[    5.739689] mpt2sas0: ioport(0x000000000000dc00), size(256)
[    6.028016] mpt2sas0: sending diag reset !!
[    7.268013] mpt2sas0: diag reset: SUCCESS
[    7.418064] mpt2sas0: Allocated physical memory: size(4134 kB)
[    7.418070] mpt2sas0: Current Controller Queue Depth(2748), Max Controller Queue Depth(2879)
[    7.418073] mpt2sas0: Scatter Gather Elements per IO(128)
[    7.648484] mpt2sas0: LSISAS2008: FWVersion(07.15.08.00), ChipRevision(0x03), BiosVersion(07.11.10.00)
[    7.648490] mpt2sas0: Dell 6Gbps SAS: Vendor(0x1000), Device(0x0072), SSVID(0x1028), SSDID(0x1F22)
[    7.648492] mpt2sas0: Protocol=(Initiator,Target), Capabilities=(Raid,TLR,EEDP,Snapshot Buffer,Diag Trace Buffer,Task Set Full,NCQ)
[    7.648577] mpt2sas0: sending port enable !!
[   10.168254] mpt2sas0: host_add: handle(0x0001), sas_addr(0x590bxxxxxxxxxxxx), phys(8)
[   15.296010] mpt2sas0: port enable: SUCCESS
&lt;/pre&gt;
&lt;p&gt;Here is a Linux dmesg after successful crossflash of firmware, but skipping installing a BIOS. Note that capabilities no longer include RAID, and BIOS is empty (00.00.00.00)&lt;/p&gt;
&lt;pre&gt;
$ dmesg | egrep -i &#39;lsi|mpt|mps|sas&#39;
[    0.000000]   HighMem  empty
[    5.784639] mpt2sas version 16.100.00.00 loaded
[    5.789191] scsi4 : Fusion MPT SAS Host
[    5.793970] mpt2sas0: 32 BIT PCI BUS DMA ADDRESSING SUPPORTED, total mem (497212 kB)
[    5.794039] mpt2sas 0000:01:00.0: irq 43 for MSI/MSI-X
[    5.794081] mpt2sas0-msix0: PCI-MSI-X enabled: IRQ 43
[    5.794086] mpt2sas0: iomem(0x00000000dfcb0000), mapped(0xe0140000), size(65536)
[    5.794088] mpt2sas0: ioport(0x000000000000dc00), size(256)
[    6.235645] mpt2sas0: Allocated physical memory: size(4964 kB)
[    6.235652] mpt2sas0: Current Controller Queue Depth(3307), Max Controller Queue Depth(3432)
[    6.235654] mpt2sas0: Scatter Gather Elements per IO(128)
[    6.468421] mpt2sas0: LSISAS2008: FWVersion(19.00.00.00), ChipRevision(0x03), BiosVersion(00.00.00.00)
[    6.468429] mpt2sas0: Dell 6Gbps SAS: Vendor(0x1000), Device(0x0072), SSVID(0x1028), SSDID(0x1F22)
[    6.468432] mpt2sas0: Protocol=(Initiator,Target), Capabilities=(TLR,EEDP,Snapshot Buffer,Diag Trace Buffer,Task Set Full,NCQ)
[    6.468517] mpt2sas0: sending port enable !!
[    8.978905] mpt2sas0: host_add: handle(0x0001), sas_addr(0x590b11c017d2a400), phys(8)
[   14.116010] mpt2sas0: port enable: SUCCESS
&lt;/pre&gt;

&lt;h2&gt;Known FreeBSD versions and their equivalent target mps driver versions&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;8.2-RELEASE: Phase 12? - not sure, but likely &lt;tt&gt;12.00.00.00-fbsd&lt;/tt&gt; - did not ship with, but &lt;a href=&quot;http://blog.eracks.com/2011/08/lsi-logic-6gbps-mps-driver-for-freebsd-8-2-release/&quot;&gt;it can be backported&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;8.3-RELEASE: Phase 13 - &lt;tt&gt;mps0: Firmware: xx.xx.xx.xx, Driver: 13.00.00.00-fbsd&lt;/tt&gt;&lt;/li&gt;
&lt;li&gt;8.4-RELEASE: Phase 14 - &lt;tt&gt;mps0: Firmware: xx.xx.xx.xx, Driver: 14.00.00.01-fbsd&lt;/tt&gt; - &lt;a href=&quot;http://docs.avagotech.com/docs-and-downloads/host-bus-adapters/host-bus-adapters-common-files/sas_sata_6g_p14/9211_8i_Package_P14_IR_IT_Firmware_BIOS_for_MSDOS_Windows.zip&quot;&gt;LSI P14 firmware&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;9.1-RELEASE: Phase 14 - &lt;tt&gt;mps0: Firmware: xx.xx.xx.xx, Driver: 14.00.00.01-fbsd&lt;/tt&gt;&lt;/li&gt;
&lt;li&gt;9.2-RELEASE: Phase 14 - &lt;tt&gt;mps0: Firmware: xx.xx.xx.xx, Driver: 14.00.00.01-fbsd&lt;/tt&gt;&lt;/li&gt;
&lt;li&gt;FreeNAS v ?? Phase 15 - &lt;tt&gt;mps0: Firmware: xx.xx.xx.xx, Driver: 15.00.00.00-fbsd&lt;/tt&gt; - &lt;a href=&quot;http://docs.avagotech.com/docs-and-downloads/host-bus-adapters/host-bus-adapters-common-files/sas_sata_6g_p15/9211_8i_Package_P15_IR_IT_Firmware_BIOS_for_MSDOS_Windows.zip&quot;&gt;LSI P15 firmware&lt;/a&gt; (&lt;a href=&quot;http://linustechtips.com/main/topic/104425-flashing-an-lsi-9211-8i-raid-card-to-it-mode-for-zfssoftware-raid-tutorial/page-4&quot;&gt;ref&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;9.3-RELEASE: Phase 16 - &lt;tt&gt;mps0: Firmware: xx.xx.xx.xx, Driver: 16.00.00.00-fbsd&lt;/tt&gt; - &lt;a href=&quot;http://docs.avagotech.com/docs-and-downloads/host-bus-adapters/host-bus-adapters-common-files/sas_sata_6g_p16/9211_8i_Package_P16_IR_IT_Firmware_BIOS_for_MSDOS_Windows.zip&quot;&gt;LSI P16 firmware&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;10.0-RELEASE: Phase 16 - &lt;tt&gt;mps0: Firmware: xx.xx.xx.xx, Driver: 16.00.00.00-fbsd&lt;/tt&gt;&lt;/li&gt;
&lt;li&gt;Phase 18 was &lt;a href=&quot;https://lists.freebsd.org/pipermail/svn-src-all/2014-July/088866.html&quot;&gt;committed&lt;/a&gt; but not in a release that I can tell.&lt;/li&gt;
&lt;li&gt;10.1-RELEASE: Phase 19 - &lt;tt&gt;mps0: Firmware: xx.xx.xx.xx, Driver: 19.00.00.00-fbsd&lt;/tt&gt; - &lt;a href=&quot;http://docs.avagotech.com/docs-and-downloads/host-bus-adapters/host-bus-adapters-common-files/sas_sata_6g_p19/9211-8i_Package_P19_IR_IT_Firmware_BIOS_for_MSDOS_Windows.zip&quot;&gt;LSI P19 firmware&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;10.2-BETA2: Phase 20 - &lt;tt&gt;mps0: Firmware: xx.xx.xx.xx, Driver: 20.00.00.00-fbsd&lt;/tt&gt; - &lt;a href=&quot;http://docs.avagotech.com/docs-and-downloads/host-bus-adapters/host-bus-adapters-common-files/sas_sata_6g_p19/9211-8i_Package_P19_IR_IT_Firmware_BIOS_for_MSDOS_Windows.zip&quot;&gt;LSI P20 firmware&lt;/a&gt; (reported by Dan Langille)&lt;/li&gt;
&lt;li&gt;10.3-RELEASE: Phase 20 - &lt;tt&gt;mps0: Firmware: xx.xx.xx.xx, Driver: 20.00.00.00-fbsd&lt;/tt&gt; - &lt;a href=&quot;http://docs.avagotech.com/docs-and-downloads/host-bus-adapters/host-bus-adapters-common-files/sas_sata_6g_p20/9211-8i_Package_P20_IR_IT_Firmware_BIOS_for_MSDOS_Windows.zip&quot;&gt;LSI P20 firmware&lt;/a&gt;
&lt;li&gt;11.0-RELEASE: Phase 20? - &lt;tt&gt;mps0: Firmware: 20.00.07.00, Driver: 21.01.00.00-fbsd&lt;/tt&gt; - (The FreeBSD driver is version 21, but the latest Avago firmware download (from 2016-04) still shows Phase 20 as the most recent).
&lt;/ul&gt;

&lt;p&gt;
&lt;strong&gt;Note:&lt;/strong&gt;After Avago bought LSI, their new download system sometimes makes direct linking more difficult. &lt;a href=&quot;http://www.avagotech.com/support/download-search/?productFamilyName=6Gb/s+SAS+Host+Bus+Adapters&amp;area2=SAS+9211-8i+Host+Bus+Adapter&amp;area3=Firmware&amp;area4=&amp;dnd-keyword=&quot;&gt;This search may help&lt;/a&gt;.
&lt;/p&gt;

&lt;h2&gt;FreeBSD firmware installers&lt;/h2&gt;
&lt;p&gt;I haven&#39;t had good luck with these, because they often can only perform a small subset of the actions necessary to upgrade firmware.  But if you need them, here they are.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;http://docs.avagotech.com/docs-and-downloads/host-bus-adapters/host-bus-adapters-common-files/sas_sata_6g_p14/Installer_P14_for_FreeBSD.zip&quot;&gt;LSI P14 FreeBSD installer&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://docs.avagotech.com/docs-and-downloads/host-bus-adapters/host-bus-adapters-common-files/sas_sata_6g_p15/Installer_P15_for_FreeBSD.zip&quot;&gt;LSI P15 FreeBSD installer&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://docs.avagotech.com/docs-and-downloads/host-bus-adapters/host-bus-adapters-common-files/sas_sata_6g_p16/Installer_P16_for_FreeBSD.zip&quot;&gt;LSI P16 FreeBSD installer&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://docs.avagotech.com/docs-and-downloads/host-bus-adapters/host-bus-adapters-common-files/sas_sata_6g_p19/Installer_P19_for_FreeBSD.zip&quot;&gt;LSI P19 FreeBSD installer&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://docs.avagotech.com/docs-and-downloads/host-bus-adapters/host-bus-adapters-common-files/sas_sata_6g_p20/Installer_P20_for_FreeBSD.zip&quot;&gt;LSI P20 FreeBSD installer&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;(For all firmware and installers, see &lt;a href=&quot;http://www.lsi.com/support/pages/download-results.aspx?component=Storage+Component&amp;amp;productfamily=Host+Bus+Adapters&amp;amp;productcode=P00049&amp;amp;assettype=0&amp;amp;productname=LSI+SAS+9211-8i&quot;&gt;LSI&#39;s archive&lt;/a&gt;)&lt;/p&gt;

&lt;h2&gt;Useful command-line snippets&lt;/h2&gt;
&lt;pre&gt;
sas2flsh -listall
sas2flsh -c 0 -o -testssid 1028:%SSID% &gt; SSID.out
sas2flsh -c %num% -f fwname.fw &gt; flash.out
sas2flsh -c %num% -b mptsas2.rom &gt;&gt; flash.out
sas2flsh -c %num% -b x64sas2.rom &gt;&gt; flash.out
sas2flsh -c %num% -o -reset &gt; reset.out
&lt;/pre&gt;

&lt;h2&gt;References&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;http://www.lsi.com/Search/pages/results.aspx?k=sas2ircu&amp;r=&quot;&gt;The LSI SAS2IRCU utility&lt;/a&gt; can show basic information about your card.&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://brycv.com/blog/2012/flashing-it-firmware-to-lsi-sas9211-8i/&quot;&gt;Bryan Vyhmeister&#39;s blog post about flashing IT firmware&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://mycusthelp.info/LSI/_cs/AnswerPreview.aspx?inc=8352&quot;&gt;mycusthelp.info comprehensive guide to many kinds of reflashing scenarios&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://forums.laptopvideo2go.com/topic/29400-lsi-sas-controller-stuff/&quot;&gt;LaptopVideo2Go forums post&lt;/a&gt; listing all cards in the hardware families that may support cross-flashing.&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://forums.freebsd.org/threads/flashing-an-lsi-9211-8i-from-ir-to-it-firmware.37925/&quot;&gt;This FreeBSD Forums post&lt;/a&gt; has good discussion about the process generally, and how to work with UEFI motherboards while flashing.&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://forums.freenas.org/index.php?threads/upgraded-to-9-3-and-getting-warning-firmware-version-19-does-not-match-driver-version-16-for-dev.25925/page-4&quot;&gt;FreeNAS thread&lt;/a&gt; about mismatching firmwmare and FreeBSD driver versions, and cautioning against P20&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://bugs.pcbsd.org/issues/4825&quot;&gt;PC-BSD bug report asking for driver version to be updated&lt;/a&gt;. PC-BSD stated that they will stick with P16 and skip P18.
&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://dan.langille.org/2013/02/21/flashing-it-firmware-for-lsi-9211-8i-on-freebsd/&quot;&gt;Dan Langille&#39;s blog about flashing IT firmware from UEFI on FreeBSD&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://forums.freenas.org/index.php?threads/confused-about-that-lsi-card-join-the-crowd.11901/&quot;&gt;FreeNAS thread&lt;/a&gt; - general overview of the issues&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://www.lsi.com/support/pages/download-results.aspx?component=Storage+Component&amp;amp;productfamily=Host+Bus+Adapters&amp;amp;productcode=P00049&amp;amp;assettype=0&amp;amp;productname=LSI+SAS+9211-8i&quot;&gt;LSI driver download list for SAS 9211-8i&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://blog.zorinaq.com/?e=10&quot;&gt;Zorinaq blog post&lt;/a&gt; about port counts, hardware compatibility, and overall great overview&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://blog.eracks.com/2011/08/lsi-logic-6gbps-mps-driver-for-freebsd-8-2-release/&quot;&gt;eracks blog post about backporting the mps driver to FreeBSD 8.2&lt;/a&gt;
&lt;li&gt;Handy eBay search: &quot;dell&quot; (ucs-71,h200,h200i,u039m,47mcv,65f44,15mcv,015mcv,00RR9J,0U039M) -h200e
&lt;/ul&gt;</description><link>http://roycebits.blogspot.com/2015/01/freebsd-lsi-sas9211-8i-hba-firmware.html</link><author>noreply@blogger.com (Royce Williams (TychoTithonus))</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6835589.post-5479665039190219088</guid><pubDate>Tue, 28 Oct 2014 06:09:00 +0000</pubDate><atom:updated>2014-10-27T22:09:18.535-08:00</atom:updated><title>Yubikey FIDO error: &quot;A timeout occurred while waiting for a Security Key to be inserted or tapped.&quot;</title><description>If you&#39;re putting a Yubikey FIDO USB U2F key into your Linux machine, and activation eventually times out with this error:
&lt;br /&gt;
&lt;br /&gt;
&lt;tt&gt;&quot;A timeout occurred while waiting for a Security Key to be inserted or tapped.&quot;&lt;/tt&gt;
&lt;br /&gt;
&lt;br /&gt;
... this may be due to ownership of the device.
&lt;br /&gt;
&lt;br /&gt;
The fix, via &lt;a href=&quot;http://forum.yubico.com/viewtopic.php?f=33&amp;amp;t=1545&quot;&gt;this Yubico forums post&lt;/a&gt;:
&lt;br /&gt;
&lt;br /&gt;
&lt;tt&gt;echo &#39;KERNEL==&quot;hidraw*&quot;, SUBSYSTEM==&quot;hidraw&quot;, MODE=&quot;0664&quot;, GROUP=&quot;plugdev&quot;, ATTRS{idVendor}==&quot;1050&quot;, ATTRS{idProduct}==&quot;0113|0114|0115|0116|0120&quot;&#39; | sudo tee /etc/udev/rules.d/70-u2f.rules
&lt;br /&gt;
&lt;br /&gt;
Before:
&lt;br /&gt;
&lt;br /&gt;
&lt;tt&gt;crw-------   1 root root      250,   6 Oct 27 21:57 hidraw6&lt;/tt&gt;
&lt;br /&gt;
&lt;br /&gt;
After:
&lt;br /&gt;
&lt;br /&gt;
&lt;tt&gt;crw-rw-r--   1 root plugdev   250,   6 Oct 27 21:59 hidraw6&lt;/tt&gt;&lt;/tt&gt;
&lt;br /&gt;
&lt;br /&gt;
Activation should now proceed normally.  Some folks had to then also restart Chrome.  Chrome 38 or higher required.
</description><link>http://roycebits.blogspot.com/2014/10/yubikey-fido-error-timeout-occurred.html</link><author>noreply@blogger.com (Royce Williams (TychoTithonus))</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6835589.post-2932033570360327334</guid><pubDate>Thu, 09 Oct 2014 05:42:00 +0000</pubDate><atom:updated>2014-10-08T21:42:56.892-08:00</atom:updated><title>Best fake WHOIS business name ever</title><description>Best fake WHOIS business name &lt;em&gt;ever&lt;/em&gt;:
&lt;pre&gt;
Admin Organization: LiddyCorp Tofu Mining Corporation of Antarctica
&lt;/pre&gt;
via &lt;a href=&quot;https://saintaardvarkthecarpeted.com/blog/&quot;&gt;https://saintaardvarkthecarpeted.com/blog/&lt;/a&gt;</description><link>http://roycebits.blogspot.com/2014/10/best-fake-whois-business-name-ever.html</link><author>noreply@blogger.com (Royce Williams (TychoTithonus))</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6835589.post-775241737592562223</guid><pubDate>Thu, 06 Sep 2012 06:03:00 +0000</pubDate><atom:updated>2012-09-05T22:03:47.047-08:00</atom:updated><title>A different kind of Rick(man) roll</title><description>&lt;p&gt;&lt;iframe src=&quot;http://www.youtube.com/embed/eob7V_WtAVg?rel=0&quot; frameborder=&quot;0&quot; width=&quot;560&quot; height=&quot;315&quot;&gt;&lt;/iframe&gt;&lt;/p&gt;

Worth the wait. &lt;a href=&quot;http://vimeo.com/27337356&quot;&gt;Larger version here&lt;/a&gt;, and more &lt;a href=&quot;http://www.davidmichalek.net/portraits/exhibitions.php&quot;&gt;here.&lt;/a&gt;

&lt;blockquote&gt;The project featured an array of glacially paced performances of theater artists and actors all genres and nationalities. With artists featured both singly and in groups, the piece offered a unique and secret glimpse into some of the world’s greatest performing artists.&lt;/blockquote&gt;

&lt;p&gt;Via: &lt;a href=&quot;http://blog.longnow.org/02012/09/05/epic-tea-time/&quot;&gt;The Long Now blog&lt;/a&gt;&lt;/p&gt;</description><link>http://roycebits.blogspot.com/2012/09/a-different-kind-of-rickman-roll.html</link><author>noreply@blogger.com (Royce Williams (TychoTithonus))</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://img.youtube.com/vi/eob7V_WtAVg/default.jpg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6835589.post-7492605960107708532</guid><pubDate>Tue, 08 May 2012 06:49:00 +0000</pubDate><atom:updated>2012-05-07T22:53:44.316-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">health</category><category domain="http://www.blogger.com/atom/ns#">life</category><title>Reframing the acceleration of addictiveness</title><description>Tantek Çelik knocks it out of the park with his &lt;a href=&quot;http://tantek.com/2011/204/b1/accelerating-addictiveness-vs-willpower-productivity-flow&quot;&gt;The Acceleration of Addictiveness vs Willpower, Productivity, and Flow&lt;/a&gt;, putting a more positive spin on Paul Graham&#39;s &lt;a href=&quot;http://paulgraham.com/addiction.html&quot;&gt;Acceleration of Addictiveness&lt;/a&gt;:

&lt;blockquote&gt;
Paul concludes his essay with &lt;strong&gt;We&#39;ll increasingly be defined by what we say no to.&lt;/strong&gt; He&#39;s right, we will and are.
&lt;br/&gt;&lt;br/&gt;
The problem is, &quot;saying no&quot; is expensive. It costs you willpower to do so. Explicitly saying no doesn&#39;t scale. We need automatic or default ways to &quot;say no&quot;. The best word we have for that is &quot;filters&quot;.
&lt;/blockquote&gt;

... and:

&lt;blockquote&gt;
&lt;a href=&quot;http://www.imdb.com/title/tt0137523/quotes?qt=qt0479082&quot;&gt;This is your life and it&#39;s ending one minute at a time.&lt;/a&gt;
&lt;br/&gt;&lt;br/&gt;
The time you spend giving into your urges and supporting your addictions is time you could have spent being creative and productive.
&lt;/blockquote&gt;

Tantek is collecting practical, constructive information about how to improve the odds on &lt;a href=&quot;http://tantek.pbworks.com/&quot;&gt;his personal wiki&lt;/a&gt;.  Great reading.</description><link>http://roycebits.blogspot.com/2012/05/reframing-acceleration-of-addictiveness.html</link><author>noreply@blogger.com (Royce Williams (TychoTithonus))</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6835589.post-3448349049896685171</guid><pubDate>Tue, 20 Mar 2012 05:36:00 +0000</pubDate><atom:updated>2012-03-19T21:51:06.516-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">family</category><category domain="http://www.blogger.com/atom/ns#">humor</category><category domain="http://www.blogger.com/atom/ns#">life</category><category domain="http://www.blogger.com/atom/ns#">steph</category><title>Smells like a pre-Internet library in here</title><description>Here is a list of things that I tend to &lt;a href=&quot;http://www.nytimes.com/2010/04/25/books/review/Kramer-t.html&quot;&gt;hoard&lt;/a&gt; (where I define &lt;span style=&quot;font-style:italic;&quot;&gt;&lt;a href=&quot;http://www.amazon.com/Stuff-Compulsive-Hoarding-Meaning-Things/dp/015101423X&quot;&gt;hoard&lt;/a&gt;&lt;/span&gt; as &quot;keep more (or longer than) needed, or conserve or manage more than the effort involved warrants&quot;):&lt;br /&gt;&lt;br /&gt;* &lt;a href=&quot;http://www.akplates.org/&quot;&gt;Alaska license plates&lt;/a&gt; (I had to get the obvious one out of the way first)&lt;br /&gt;* &lt;span style=&quot;font-weight:bold;&quot;&gt;books and magazines&lt;/span&gt;&lt;br /&gt;* cardboard boxes&lt;br /&gt;* coins&lt;br /&gt;* computers and peripherals&lt;br /&gt;* computer adapters, cords and computer-related tools&lt;br /&gt;* dowls, rods, tubes&lt;br /&gt;* ID cards&lt;br /&gt;* movie stubs&lt;br /&gt;* paper&lt;br /&gt;* pens and pencils&lt;br /&gt;* plane tickets&lt;br /&gt;* twist ties&lt;br /&gt;* water&lt;br /&gt;&lt;br /&gt;... and here are the things that I think that my wife hoards:&lt;br /&gt;&lt;br /&gt;* &lt;span style=&quot;font-weight:bold;&quot;&gt;books and magazines&lt;/span&gt;&lt;br /&gt;* candles&lt;br /&gt;* checks&lt;br /&gt;* coffee cups&lt;br /&gt;* cookbooks&lt;br /&gt;* glass jars&lt;br /&gt;* greeting cards received&lt;br /&gt;* leftovers&lt;br /&gt;* toiletries&lt;br /&gt;&lt;br /&gt;Obviously, we have many bookshelves.</description><link>http://roycebits.blogspot.com/2012/03/smells-like-pre-internet-library-in.html</link><author>noreply@blogger.com (Royce Williams (TychoTithonus))</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6835589.post-8619376261560767951</guid><pubDate>Tue, 27 Dec 2011 22:42:00 +0000</pubDate><atom:updated>2011-12-27T13:49:17.859-09:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">geek</category><title>APC Masterswitch errors: heap corrupted : non-matching sizes</title><description>Sometimes, an APC Masterswitch will start spewing errors like this on its console:&lt;br /&gt;&lt;br /&gt;&lt;tt&gt;heap corrupted : non-matching sizes :-22904..13041&lt;/tt&gt;&lt;br /&gt;&lt;br /&gt;This sometimes happens when some revisions of the APC Masterswitch OS have too much uptime.  &lt;br /&gt;&lt;br /&gt;The issue can be temporarily resolved by rebooting the management card.  Even though your terminal is filling up with these errors, you can still actually log in and reboot the card - you just have to do it semi-blind.&lt;br /&gt;&lt;br /&gt;For some revisions of OS, the key sequence is:&lt;pre&gt;&lt;br /&gt;[username]&lt;br /&gt;[password]&lt;br /&gt;3 (the &#39;System&#39; menu)&lt;br /&gt;5 (the &#39;Tools&#39; menu)&lt;br /&gt;1 (the &#39;Reboot&#39; option)&lt;br /&gt;YES (all in caps, to confirm that you want to reboot)&lt;br /&gt;&lt;/pre&gt;&lt;br /&gt;This will clear the error without power-cycling any devices.  I suspect that an OS upgrade would address the issue permanently.</description><link>http://roycebits.blogspot.com/2011/12/apc-masterswitch-errors-heap-corrupted.html</link><author>noreply@blogger.com (Royce Williams (TychoTithonus))</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6835589.post-4601674275608643501</guid><pubDate>Fri, 23 Dec 2011 21:54:00 +0000</pubDate><atom:updated>2011-12-23T12:56:42.243-09:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">family</category><category domain="http://www.blogger.com/atom/ns#">life</category><category domain="http://www.blogger.com/atom/ns#">steph</category><title>Better late than never</title><description>I just realized that I didn&#39;t mention something important here.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;a href=&quot;http://www.royceandsteph.com/family/&quot;&gt;We had a baby&lt;/a&gt;!&lt;/strong&gt;</description><link>http://roycebits.blogspot.com/2011/12/better-late-than-never.html</link><author>noreply@blogger.com (Royce Williams (TychoTithonus))</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6835589.post-5849235514284222638</guid><pubDate>Sat, 22 Oct 2011 19:55:00 +0000</pubDate><atom:updated>2011-10-22T11:58:29.878-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">freebsd</category><category domain="http://www.blogger.com/atom/ns#">geek</category><title>Using vi key bindings in Perl&#39;s debugger on FreeBSD</title><description>Even after verifying that &lt;tt&gt;Term::ReadKey&lt;/tt&gt; and &lt;tt&gt;Term::ReadLine&lt;/tt&gt; were part of my perl distribution:&lt;br /&gt;&lt;pre&gt;&lt;br /&gt;royce@heffalump$ perl -e &#39;use Term::ReadKey;&#39;&lt;br /&gt;royce@heffalump$ perl -e &#39;use Term::ReadLine;&#39;&lt;br /&gt;royce@heffalump$&lt;br /&gt;&lt;/pre&gt;&lt;br /&gt;... and making sure that vi key bindings were listed in my .inputrc:&lt;br /&gt;&lt;pre&gt;&lt;br /&gt;royce@heffalump$ grep editing-mode ~/.inputrc&lt;br /&gt;set editing-mode vi&lt;br /&gt;&lt;/pre&gt;&lt;br /&gt;... I still couldn&#39;t use &#39;em, as demonstrated by what happened when I tried to use movement keys:&lt;br /&gt;&lt;pre&gt;&lt;br /&gt;  DB&lt;1&gt; testtesttest^[[A&lt;br /&gt;&lt;/pre&gt;&lt;br /&gt;In my research, I discovered that &lt;a href=&quot;http://ubuntuforums.org/showthread.php?t=287435&quot;&gt;Ubuntu folks were installing a different ReadLine&lt;/a&gt;.  I eventually found the &lt;tt&gt;devel/p5-ReadLine-Perl&lt;/tt&gt; port, which has this &lt;tt&gt;pkg-descr&lt;/tt&gt;:&lt;br /&gt;&lt;pre&gt;&lt;br /&gt;Perl 5 ships with a module called Term::ReadLine which is an interface&lt;br /&gt;to command line editing and recall.  The version that ships with Perl&lt;br /&gt;is only a stub, and offers little functionality.&lt;br /&gt;&lt;br /&gt;This module supplants the Term::ReadLine stubs with real command line&lt;br /&gt;editing and recall facilities, written entirely in Perl.  Applications&lt;br /&gt;that use Term::ReadLine do not need to be modified to gain the benefits&lt;br /&gt;of this package; it will happen transparently upon installation.&lt;br /&gt;&lt;/pre&gt;&lt;br /&gt;After installing &lt;tt&gt;p5-ReadLine-Perl&lt;/tt&gt;, I&#39;m up and running.</description><link>http://roycebits.blogspot.com/2011/10/using-vi-key-bindings-in-perls-debugger.html</link><author>noreply@blogger.com (Royce Williams (TychoTithonus))</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6835589.post-3121806296539658477</guid><pubDate>Mon, 26 Sep 2011 14:15:00 +0000</pubDate><atom:updated>2011-09-26T06:26:07.081-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">bsd</category><category domain="http://www.blogger.com/atom/ns#">geek</category><title>FreeBSD apr1 upgrade error: Configure: 9904: Syntax error: word unexpected (expecting &quot;)&quot;)</title><description>I was having trouble with apr1 on a FreeBSD web server. apr1 is used by Apache.  The configure script for apr1 was dying with this error:&lt;br /&gt;&lt;pre&gt;&lt;br /&gt;Performing libtool configuration ... &lt;br /&gt;. / configure: line 9904: syntax error near unexpected token `lt_decl_varnames, &#39; &lt;br /&gt;&lt;/pre&gt;&lt;br /&gt;... which boiled down to:&lt;br /&gt;&lt;pre&gt;&lt;br /&gt;. / configure: line 9904: `lt_if_append_uniq (lt_decl_varnames, SHELL,,, &#39;&lt;br /&gt;&lt;/pre&gt;&lt;br /&gt;Fortunately, &lt;a href=&quot;http://lists.freebsd.org/pipermail/freebsd-apache/2010-June/001789.html&quot;&gt;this thread&lt;/a&gt; was eventually resolved by someone finding out that they had some &lt;tt&gt;libtoo115&lt;/tt&gt; files left over, even though it had been deinstalled.   I manually removed the extraneous files with:&lt;br /&gt;&lt;pre&gt;&lt;br /&gt;# pkg_delete libtool-1.5.24 &lt;br /&gt;# rm -rf /usr/local/share/libtool15 &lt;br /&gt;# rm -f /usr/local/bin/libtool15 /usr/local/bin/libtoolize15&lt;br /&gt;&lt;/pre&gt;&lt;br /&gt;I am now back up and running! &lt;br /&gt;&lt;br /&gt;Thanks to &lt;a href=&quot;http://vladstar.com/&quot;&gt;Vladislav Staroselskiy&lt;/a&gt; for &lt;a href=&quot;http://vladstar.com/blog/?post=934&quot;&gt;a very helpful post about the FreeBSD apr1 libtool15 problem&lt;/a&gt;.</description><link>http://roycebits.blogspot.com/2011/09/freebsd-apr1-upgrade-error-configure.html</link><author>noreply@blogger.com (Royce Williams (TychoTithonus))</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6835589.post-7043202227630841066</guid><pubDate>Fri, 19 Aug 2011 06:17:00 +0000</pubDate><atom:updated>2011-09-26T06:26:42.898-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">6981st</category><category domain="http://www.blogger.com/atom/ns#">family</category><category domain="http://www.blogger.com/atom/ns#">history</category><category domain="http://www.blogger.com/atom/ns#">humor</category><title>A little post-1964-earthquake humor</title><description>A guest post from my father, for which I asked him to share a story about something that happened after things had mostly gotten back to normal after the 1964 Alaska Earthquake.  Dad worked at what was then the 6981st, and is now the &lt;a href=&quot;http://en.wikipedia.org/wiki/381st_Intelligence_Squadron&quot;&gt;381st Intelligence Squadron&lt;/a&gt; on Elmendorf (now Joint Base Elmendorf-Richardson).  For those who know the work, the terminology here will be familiar.&lt;br /&gt;&lt;br /&gt;...&lt;br /&gt;&lt;br /&gt;The Great Alaska Earthquake happened in late March of 1964.  9.2 on the Richter scale.  As many folks know, it was devastating to many parts of southeast Alaska.&lt;br /&gt;&lt;br /&gt;Sometime after that event, I was on D Flight “tearing traffic” as usual during a swing shift.  One of the Flight’s 292X1s was a “goosey” sort of guy.  He was diligently working away that evening as I approached his work station from behind, preparing to “tear traffic” from his position.  As I came up behind him I reached up and tapped the fluorescent light fixture hanging directly above.  This started the fixture swinging.  Then, “tearing traffic” in front of him, I got his attention and looked up as if to suddenly notice the swinging light fixture.  He saw I was looking up so he looked up too.  He saw the fixture moving and before he had any second thoughts, leaped out of his chair and at double time made for the Operations door.  He went past other folks diligently working, through the doors, down the stairs, past the Air Police person guarding access to the upstairs Operations area, through the first floor foyer and out the front doors of the building to the flag pole located in the center of the secure compound area.&lt;br /&gt;&lt;br /&gt;Once he got there he couldn’t understand why others weren’t there too.  He was sure he had quickly reacted to an earthquake aftershock.&lt;br /&gt;&lt;br /&gt;When no one else was around except him and the flag pole it dawned on him that perhaps the swinging light fixture had not caused what he thought.  He strolled back into the building, up to the Air Police person on guard duty, showed the guard his badge and continued on up to the second floor and back to his position in the Operations area.  He did not stop or even slow down to answer anyone’s questions about his rapid departure a few minutes earlier. &lt;br /&gt;&lt;br /&gt;By that time I figured that he had an idea who was responsible for his quick-reaction to the swinging light fixture.&lt;br /&gt;&lt;br /&gt;I managed to avoid his attempts to find me through the rest of the swing shift.&lt;br /&gt;&lt;br /&gt;Damn 202s!  Not funny!  Be a takin&#39; &#39;er easy.  Ur Dad sends</description><link>http://roycebits.blogspot.com/2011/08/little-post-1964-earthquake-humor.html</link><author>noreply@blogger.com (Royce Williams (TychoTithonus))</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6835589.post-171020681621468379</guid><pubDate>Sun, 07 Aug 2011 15:22:00 +0000</pubDate><atom:updated>2011-08-07T08:09:18.387-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">tycho</category><title>Remembering William Sleator</title><description>The Sleator family has created &lt;a href=&quot;http://williamsleator.wordpress.com/2011/08/05/hello-world/&quot;&gt;a blog for posting memories about William Sleator&lt;/a&gt;.</description><link>http://roycebits.blogspot.com/2011/08/remembering-william-sleator.html</link><author>noreply@blogger.com (Royce Williams (TychoTithonus))</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6835589.post-5698806244844673416</guid><pubDate>Fri, 05 Aug 2011 14:14:00 +0000</pubDate><atom:updated>2011-08-07T10:04:26.846-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">tycho</category><title>William Sleator, 1945 - 2011</title><description>Publisher&#39;s Weekly recently &lt;a href=&quot;https://twitter.com/#!/PublishersWkly/status/98803531997380608&quot;&gt;tweeted&lt;/a&gt; that &lt;a href=&quot;http://www.tycho.org/sleator.shtml&quot;&gt;William Sleator&lt;/a&gt; passed away in Thailand on Tuesday, August 2nd.  He was 66.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.tycho.org/&quot;&gt;I am a big fan&lt;/a&gt;. My default online handle, &lt;a href=&quot;http://www.tycho.org/tt.shtml&quot;&gt;TychoTithonus&lt;/a&gt;, is the name of the main character in his book &lt;a href=&quot;http://www.tycho.org/&quot;&gt;The Green Futures of Tycho&lt;/a&gt;.  &lt;br /&gt;&lt;br /&gt;I emailed with him a few times, and he signed one of my copies, but I regret that I never met him in person.  &lt;br /&gt;&lt;br /&gt;His work struck a chord with me in ways that are hard to explain.  Some part of my childhood is now written in stone.&lt;br /&gt;&lt;br /&gt;Other links about his passing:&lt;br /&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&quot;http://blog.abramsbooks.com/2011/08/04/in-memoriam-william-sleator/&quot;&gt;Abrams, his last publisher&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;http://www.schoollibraryjournal.com/slj/home/891509-312/science-fiction_master_william_sleator_1945-2011.html.csp&quot;&gt;School Library Journal&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;http://www.publishersweekly.com/pw/by-topic/authors/obituaries/article/48229-obituary-william-sleator.html&quot;&gt;Publishers Weekly article&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;http://www.yalsa.ala.org/thehub/2011/08/04/r-i-p-william-sleator/&quot;&gt;The YALSA Hub&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;strong&gt;Update 2011-08-07&lt;/strong&gt;: &lt;a href=&quot;http://www.nytimes.com/2011/08/07/books/william-sleator-science-fiction-writer-for-young-adults-dies-at-66.html&quot;&gt;William Sleator&#39;s obituary in the New York Times&lt;/a&gt;.</description><link>http://roycebits.blogspot.com/2011/08/william-sleator-1945-2011.html</link><author>noreply@blogger.com (Royce Williams (TychoTithonus))</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6835589.post-8867405612681606947</guid><pubDate>Tue, 12 Jul 2011 20:47:00 +0000</pubDate><atom:updated>2011-07-12T12:49:54.127-08:00</atom:updated><title>Awkward Family Photos - the Board Game</title><description>Hmm ... will &lt;a href=&quot;http://www.michaelhanscom.com/&quot;&gt;Michael&lt;/a&gt;&#39;s &lt;a href=&quot;http://www.michaelhanscom.com/eclecticism/2010/06/23/my-famous-awkward-family/&quot;&gt;famous awkward family photo&lt;/a&gt; be included in &lt;a href=&quot;http://craziestgadgets.com/2011/07/12/awkward-family-photos-board-game/&quot;&gt;the new Awkward Family Photos Board Game&lt;/a&gt;?</description><link>http://roycebits.blogspot.com/2011/07/awkward-family-photos-board-game.html</link><author>noreply@blogger.com (Royce Williams (TychoTithonus))</author></item></channel></rss>