Monthly Archives: August 2007

flashing buffalo router from mac os x

I bought the highly spoken of (scroll down here) Buffalo WHR-G125, which is cheap and flashed it’s software so I can use dd-wrt. I did this from a mac following the directions, but in the end I had a tough time getting the timing right. So this posting’s purpose is to explain how to get the timing right.

I used two tricks. The first is to use expect to script tftp. The second is ignore the instructions (which say to launch the upload when the lights on the router indicate that the single LAN Ethernet your using to connect to it is now active). Instead I wait until the Mac’s brings up it’s interface.

My expect script looked like this:

#!/usr/bin/expect -f
set  timeout 3000
spawn “tftp”
expect “tftp> “; send “binary\n”;
expect “tftp> “; send “rexmt 1\n”;
expect “tftp> “; send “connect 192.168.11.1\n”;
expect “tftp> “; send “put dd-wrt.v24_std_whr-g125.bin\n”;
expect “tftp> “; send “quit\n”;

You use this command to run that.

 % expect flash_it  

That’s pretty straight forward and expect is installed on the mac if you have unix tools, which your likely to if your flashing routers in your spare time. You invoke it like so:

It’s easy to see when the Mac bring up the network connection to the router. When you set things up following the instructions you configured the your network to talk to the router. Open that system preferences up again and stare at the TCP/IP page. You can monitor that page to see the connection to the router come up; first the Ethernet is sensed and a moment latter the IP address is configured; it’s at that point you hit return on the command above.

Wibble

I haven’t really a clue what wibble actually means, but it certainly looks like a fine neologism who’s support I encourage. Meanwhile I’m quite pleased to see that fat-tail distributions are now recognized as so common that we can ridicule those who pretend not to know that. That certainly wasn’t the case even a few years ago.

The W3 and IETF should, and I believe this is one of the rare cases where they would agree, that wibble should be the official pronunciation for WWW. It’s apparent association with states of emotional insanity and high-minded blovating seem like a perfect fit for what most sites serve up from that those names.

In other news related to improving our language tools I’m sure I’ll need the phrase used in this headline: ‘… Outage Blamed on a “Deficiency in An Algorithm”‘.

HamachiX & balance

HamachiX is a Mac OS X application for casually creating “virtual” private networks connecting random computers. It’s implemented by wrapping some user interface around the no charge variant of the proprietary Hamachi VPN product. The VPN(s) it creates are named. The machines that join that network providing an appropriate password and get IP addresses like 5.85.1.2. At which point they may exchange data packets with each other. Hamaci is clever in that it uses p2p tricks to bust thru firewalls.

A typical application is to create a community of users who share iTunes collections, or printers, or whatever.

I’m using this to create http listeners on machines which sit on the public network that then forward to listeners on my laptop. When ever my laptop manages to get on the network Hamanchi rejoins the appropriate network and the forwards start working again. This allows me to demo things running my laptop to random folks on the network at large. I do the port forwarding with balance (sudo port install balance).

It looked like I could do something similar with tinc and avoid the issues raised by using proprietary software. But, MacPorts doesn’t include tinc and this certainly was easy. There are lots of choices for how to forward the listener, as I am with balance. I’d be curious to hear of how other people do this kind of thing?

Update: This widget is an alternative to HamachiX once you get started. You can do all this on the command line, say on 10.3.9.

Update 2: Some people find that HamachiX goes crazy and consumes vast amounts of memory.  A problem you can work around by using it as a easier way to install things and then use the widget or the command line tool hamachi from there on in.  The command line tool gives you a better model of what’s really going on.
I’m finding it dependable for simple tcp/ip connections; but mDNS is spotty.  The forums are full of complaints about various non-working scenarios and some of those are real v.s. user confusion.  One of the foundation pieces, tuntap, is also known to occationally misbehave on intel macs.

Grammar

Years ago I was on the periphery of a massive standardization effort and very very late in the process a feature in the spec was found to be, well, unimplementable.  So under the guise of a “grammar fix” the spec was revised to change a “will” to a “will not.”

That story is filed in my head with along with the trick used in our state legislature to buy time when the budget is running late.  They send a guy up on a chair to turn back the clock.

But really, this story takes the cake!  Apparently this guy managed to stick a 10 million dollar appropration in for a friend of his, after congress passed the bill but before the president signed it.  During what appears to be the typesetting step.

I don’t recall the typesetting step being clearly specified in the constitution.  Which is odd, since the republic was founded after the invention of movable type.

Money supply

Brad Delong write “Central Banking in Practice

So, today the monetary base in the North Atlantic economies is 7% higher than it was yesterday–an annualized growth rate  of 2100% per year

This is indeed a significant liquidity event…

I.e. central banks increased the money supply, presumably some gears needed lubricating.  It makes the mind boggle.

Regulatory Information Friction

Information is the gold standard of an economic public good, but here we mean good as in trading-good rather than the black and white of good-vs-evil.  There are plenty of examples (personal information, credit card numbers, passwords, trade secrets) where the flow of information drifts quickly into the gray areas.  The physical world used to be a lot more helpful in keeping information flows in check; the clay tablets got broken, the papers could be burnt, the walls contained the whispers.

There is nothing inherently immoral about creating regulatory barriers to increase the friction of information flows.  We do this a lot: copyright, patent rights, privacy laws, gambling, pornography, restrictions on free speech, digital rights management.  Questions about what we want from such regulatory mechanisms do, of course, need to be balanced off against questions about what can be effectively implemented.

Recently in my town private emails between some town employees were publicly revealed.  Many people seem to feel that these emails are should be public record since government mail servers were involved in the exchanges.  My reaction: “Wait till it happens to you.”  This lack of sympathy for other people’s privacy seems widespread.    Along these same lines I’m quite quite sympathetic to the lame attempt of these workers to limit the extent that workplace monitoring has on their privacy.

The means they chose is bogus, since it’s not implementable; but I’m entirely comfortable with the idea what we need to find ways to limit the flows of this torrent of information we are creating which enables pervasive monitoring of our every moment and action.  I’m not terribly sanguine that we can find such regulatory frames; but we should be looking hard.  That each time somebody attempts to find one we all make fun of them isn’t really terribly helpful.

Early Patent Pooling

My recieved wisdom is that patent pooling was invented to solve a deadlock problem.  As I understand the story the sewing machine makers all acquired assorted patents during the early years.  Then in the 1850s they sued each other.  The courts forced them all to stop production bringing the entire industry to a halt. Shortly after they all all gathered together and invented the patent pool.  (This is a half a century before such activity would raise serious antitrust questions.)

Dan Cohen notes that the Shaker’s also pooled their patents.  Of course the two cases aren’t quite the same since those religious communities are not natural competitors while the sewing machine manufactures are.

I wonder which came first?  Certainly the idea that your theological kin form a club, with lower cost access to various club goods is very old.

Payments? Check

Amazon appears to be the firm doing the most sophisticated job of engineering an instance of the new species of operating system. They just released the API for the payment component. This component weighs in at 260 pages.

Some of what they have put forward, e.g. the historical pricing or the access to Alexa data, are perfect examples of how these OS will leverage getting close to unique resources that the hub vendor has aggregated – i.e. these are vertical in the sense that they leverage unique supply side advantages.  Others like the storage and compute offerings are perfectly horizontal.  The payment’s offering, while principally horizontal, a bit of both.

Clearly some of these are more strategic than others.  I’d love to see their road map and to understand better the cross API synergy and lock-in.  I presume there are people at eBay/paypal, Google, Microsoft, and Yahoo thinking a lot about those.  If I were them I’d hope Walmart buys Amazon.
It is looking risky to be a hub vendor who just sell bandwidth, hosting, payments, what ever.  It is interesting how quickly these hubs are threatening each other’s survival.