Register your own .mil Domain 334
JWSmythe writes " As reported in This Story at theregister.co.uk ,and on dailyrotten.com, it seems the US Department of Defense has dropped the ball. Not only can you register a .mil domain, but you can find "secret" domains that aren't publically known (the gov't uses security through obscurity?). I'm looking forward to hacker.mil, warez.mil, and porn.mil."
hard to believe (Score:1, Interesting)
What was that about homelnd security? (Score:1, Interesting)
2600 contest? (Score:5, Interesting)
Your Government At Work (Score:2, Interesting)
How long before Google is sued? (Score:5, Interesting)
This implies that even if the DoD fixes the problem, the Google caches will still be available (until they expire or are replaced). Now, in the past, we've heard reports of people being upset that Google cached information. However, this time, the cache contains information pertaining to "national security" (that great new buzzword). I wonder, what will happen? Will these URLs be silently deleted from the cache? Will Google be told that cacheing links is now illegal because it could aid terrorists? Will they be prevented from cacheing .gov and .mil? Will Google be sued out of existence?
We've all found Google caches to be useful, when, say the documentation for an open source project is hosted via 56K modem line in the Czech Republic, for example, or even when a site is Slashdotted, but it'll be interesting to see what happens about this, and how the goverment may over-react.
(Note, if you're too stupid to understand this, I'm not talking about blame here - don't bother saying "Google rulez, the militery is dum asses for leeving these sitez open, u r an idiot...". I'm talking about reprocussions. Certainly Google doesn't "know" what information a link contains when they cache it. Certainly it's the government's fault for leaving open admin pages with default passwords listed on the page. But just because someone isn't at fault, doesn't mean they can't get screwed over.)
Re:what about... (Score:3, Interesting)
That's the funniest shit so far today.
The peace.mil was also pretty good.
I'm wondering how with all the billions of dollars we spend on military shit, how the military can constanly screw things up... BTW, was .mil supposed to only be US mil or could any military anywhere get a .mil domain? And what kind of proof did you have to show to prove you were a military organization?
Re:here it is... (Score:2, Interesting)
hmm (Score:2, Interesting)
Re:Hmm.... (Score:5, Interesting)
nic.mil/cgi-bin/domain [nic.mil]
Patriotic Honeypots (Score:2, Interesting)
Editing *.mil* domains through a *logged* cgi form on a *.mil* server. Hello, no, I don't think so, thankyouverymuch. Might as well just a T-Shirt saying "got root?" or something...
Re:here it is... (Score:3, Interesting)
And, no. I'm not going to be the one to try it.
Re:Aaahh (Score:2, Interesting)
NOTHING.
It gives you a text template which you are intended to then mail in.
This is not a story.
Re:Here is the access list (Score:3, Interesting)
Open access to a list of IP addresses of
Re:How long before Google is sued? (Score:5, Interesting)
Good point in general, though. Seems like the maintainer of a website should have the ability to remove content from said website, in the event that it turns out to not be true, to be libelous, dangerous, or any number of other things. I've always thought a Google feature to purge specific pages from the cache would be a good idea, but the implementation of that would be tricky.
One of the biggest problems with this is how to ensure that the requestor is authorized to speak for the website? A good first thought is to coordinate with the e-mail addresses in the whois record for the domain, but of course any domain can have any number of separate websites managed by different people.
Let me think aloud for a moment... we know that Google looks for a robots.txt file before indexing a site. Let's say that a field were added to the robots.txt file that identifies a specific PGP key that is authorized to perform such actions. Not specific to Google, of course... this would be the e-mail address that speaks for the site in any number of ways. Something as simple as:
MaintainerKey: 9AB3250D
I don't know a whole LOT about PGP, but I think I know that each public key has a hex identifier (mine is above) that uniquely identifies it and allows others to request it from a keyserver.
When an e-mail formatted in a specific format (at the discretion of Google and other individual publishers of course) comes in, the public key can be retrieved and the signature of the e-mail validated, and they at least know that the sender is authorized by the site to speak for it. Action from this point forward would be at the discretion of Google, but this is at least a potential TECHNICAL solution to the problem of access.
Then there's the matter of public key revocation and expiration. Perhaps it's a better idea to have an e-mail address is the robots.txt file and to accept e-mail from that address provided that the current PGP public key is used to sign the message.
Again, just thinking out loud...
Re:what about... (Score:4, Interesting)
Anyway...
I'm wondering how with all the billions of dollars we spend on military shit, how the military can constanly screw things up...
Because it is run by humans, contrary to some theories on the Left.
BTW, was
US Military only.
And what kind of proof did you have to show to prove you were a military organization?
The command that handles the domain verifies the request. I am sure that there are ways to insert a fake request and have it approved (in addition to this new finding), the same way we inserted false reports about bad Chinese ammunition into the NVA system, etc.
Re:Here is the access list (Score:4, Interesting)
What's even more depressing is that it looks like some of these guys use AOL...
Re:The Register story is two days old. (Score:2, Interesting)
Re:what about... (Score:3, Interesting)
Because we spend $$billions on toys, and virtually nothing on people.
Toys make defense companies rich. Servicemembers are paid less than fast-food workers.
Re:How long before Google is sued? (Score:2, Interesting)
Lose your +2? (Score:5, Interesting)
Ok, so the new way of doing things is that instead of adding a point to your comment's overall score when you post with your karma bonus, your comment is posted at 1 with a separate "karma_bonus=yes|no" variable. Thereafter, users can specify how much weight to assign to the karma bonus on their preferences page. This was 0 when the editors quietly rolled in the changes without telling anyone (why so sneaky?), but has since been changed to '+1' by default, to by default be the same as the old way.
So, your comment that got 3 good moderations is scored at 4/1. Users who have a '+1' modifier to karma bonus will see this comment at 5, whereas users with a '0' karma modifier will see it at 4, and users with (for whatever reason) a '-6' modifier will see it at -2. If such a thing were possible.
Unfortunately, I see this as making it unlikely that comments posted with a karma bonus will ever be modded up to 5, since most moderators will be viewing with a karma bonus and see that the comment is already scored at 5, and that it therefore cannot be modded up further.
I'm going to say that the way this was changed was disgraceful. There is no reason not to maintain a place on slashdot indicating how the code is being changed. I have relied on CmdrTaco's journal [slashdot.org] to inform me of changes, but in this case it was silent, and after thinking about it further, it's still a crappy way of running things.
It all goes back to the difference between slashdot as community and slashdot as business. As a business, sure, slashdot can do whatever the hell it wants, who am I to lecture, blah blah blah. But as a community, changing things in profound ways without approval, comment, or even notification is bastardly. And slashdot as a business would do well to perceive its dimensions as a community.