Blog

pkgconf 1.1.0 release and new kaniiniware bug bounty program!!!

To kick off the 2017 year, I have released pkgconf 1.1.0.

pkgconf 0.9.12 and future pkgconf versioning changes

pkgconf 0.9.12 was released earlier today which improves some minor edge case issues with the deduplication support.

RobustIRC isn't robust

Recently a new IRC implementation called RobustIRC was released. Among other things, it claims:

Rethinking ircd

Lately I have been working on an ircd, initially to host the channels which will be moved from irc.atheme.org once it is terminated. The result of this work is three python packages: ircmatch, ircreactor, and mammon. When combined, these provide a modular IRC implementation - ircmatch provides IRC hostmask matching and collapsing, ircreactor provides translation and manipulation of RFC1459 messages into an intermediate representation, and mammon brings it all together on top of Python 3.4's excellent asyncio framework.

On the topic of Snoonet

So, there is this network called Snoonet. People have occasionally asked me what the problem was between the Atheme community and Snoonet, so I will attempt to explain it.

Do not use or provide DH-AES or DH-BLOWFISH for SASL/IAL authentication

Atheme 7.2 dropped support for the DH-AES and DH-BLOWFISH mechanisms. This was for very good reason.

How does Brocade's VCS stack up for resiliency?

This post is part of a series wherein we break various networks, using a transparent bridge lovingly called "the apparatus". In this series, we're going to learn how distributed systems intersect with the modern physical network, and why certain approaches and topologies are best avoided. In this particular post, we explore Brocade's VCS platform, as implemented on it's VDX switches, and test various failure domains using the apparatus.

How resilient are ethernet fabrics anyway

This post is part of a series wherein we break various networks, using a transparent bridge lovingly called "the apparatus". In this series, we're going to learn how distributed systems intersect with the modern physical network, and why certain approaches and topologies are best avoided. In this particular post, we will discuss the CAP theorem and how it applies to network fabrics of varying design, as well as the design and implementation of the apparatus.

Hilarious shit that audacious users say

This is just a collection of hilarious quotes we've seen over the years of working on Audacious, a reasonably popular audio player. If you want to know where a quote came from, just google it. I've left these suckers fully unedited for your enjoyment. The only emphasis added is bolding of the more ridiculous parts, and hilarious replies which are on the same thread are kept in context.

CoreAudio, or how to actually use the worst documented audio API in history

Recently I started working on a CoreAudio plugin for audacious, to replace the old one which was removed in Audacious 3.2, since the mac port was abandoned due to the fact that Gtk+ is horrible on mac. Instead of updating the old CoreAudio plugin which was very limited and consisted of bad code ported from the XMMS days, I decided to start from scratch, using the simple SDL output plugin as a model.

Leaving atheme

Today I am announcing that I have decided to resign from atheme.org. With this, all involvement from me in IRC-related projects should be considered terminated; I have removed myself from the various machines run by Atheme and the github organization.

Upgrading a production machine to Alpine 3.x - the definitive guide

This documents my upgrade process to the Alpine 3.0 tree from Alpine 2.8 tree. In reality, they are the same tree, but with different build parameters... specifically Alpine 3.0 uses Musl and Alpine 2.8 does not. Alpine 2.8 is also the last planned release series featuring uClibc.

ShapeShifter: The Latest in Snake Oil

Several people sent me a link recently to the ShapeShifter, a new web-application firewall product released by Shape Security. Among other things, it promises to protect your website by "applying polymorphism as a defense strategy."

Hosting Companies and CEOs

A lot of people have asked me today, what my opinion is on BurstNet getting a new CEO. This is not unusual for me, a lot of people ask my opinion every time one of these things happens. Especially now days because I have significant involvement in one of Dallas's truly independent datacenters, which apparently makes me an expert on the hosting industry.

advanced abuild hacking, part 1

This is kind of a quick and direct introduction to how to work with abuild and APKBUILDs in a low-level way.

Atheme in 2014

One could argue that Atheme has not had a very good year for 2013. In a lot of ways, this is because what little precious time and energy I have to spend on free software has had to go to more important and urgently required projects, such as pkgconf.