Comments on: Cracking voyeurism
http://www.metafilter.com/101448/Cracking-voyeurism/
Comments on MetaFilter post Cracking voyeurismFri, 11 Mar 2011 08:45:31 -0800Fri, 11 Mar 2011 08:45:31 -0800en-ushttp://blogs.law.harvard.edu/tech/rss60Cracking voyeurism
http://www.metafilter.com/101448/Cracking-voyeurism
Using <abbr title="In computer terminology, a honeypot is a trap set to detect, deflect, or in some manner counteract attempts at unauthorized use of information systems. Generally it consists of a computer, data, or a network site that appears to be part of a network, but is actually isolated and monitored, and which seems to contain information or a resource of value to attackers.">honeypots</abbr> and logging tools, some server admins have logged actual <a href="http://george.hedfors.com/content/worlds-worst-hacker">server break-in</a> <a href="https://seventhoctober.net/2010/04/o-rly/">attempts</a> <a href="http://kippo.rpg.fi/playlog/?l=20091122-075013-5055.log">by</a> <a href="http://kippo.rpg.fi/playlog/?l=20100316-233121-1847.log">nincompoop</a> <a href="http://blog.macuyiko.com/2011/03/running-ssh-honeypot-with-kippo-lets.html">crackers</a>. <br /><br />The honeypot in question is <a href="http://code.google.com/p/kippo/">Kippo</a>. You might want to run <a href="http://www.fail2ban.org/">fail2ban</a> to partially combat break-in attempts.post:www.metafilter.com,2011:site.101448Fri, 11 Mar 2011 08:35:53 -0800Foci for AnalysissecuritycrackinghackingcomputersecurityhoneypotslinuxcomputersitBy: demiurge
http://www.metafilter.com/101448/Cracking-voyeurism#3569955
What triggers the owl prompt?comment:www.metafilter.com,2011:site.101448-3569955Fri, 11 Mar 2011 08:45:31 -0800demiurgeBy: seventyfour
http://www.metafilter.com/101448/Cracking-voyeurism#3569956
I don't wget it.comment:www.metafilter.com,2011:site.101448-3569956Fri, 11 Mar 2011 08:45:48 -0800seventyfourBy: bicyclefish
http://www.metafilter.com/101448/Cracking-voyeurism#3569967
I enjoyed listening to 'Still Alive.' I'm going to need need help with the rest.comment:www.metafilter.com,2011:site.101448-3569967Fri, 11 Mar 2011 08:49:11 -0800bicyclefishBy: Ad hominem
http://www.metafilter.com/101448/Cracking-voyeurism#3569976
Seems like the owl prompt is triggered when he tries to install the rootkit. I'm kinda guessing That the honeypot spits it out whenever you try to do something unsupported.comment:www.metafilter.com,2011:site.101448-3569976Fri, 11 Mar 2011 08:51:13 -0800Ad hominemBy: Foci for Analysis
http://www.metafilter.com/101448/Cracking-voyeurism#3569980
The "owl prompt" is the result of the downloaded exploit scripts being prevented from actually running any malicious code. Some of the stuff Kippo does:
<blockquote>
Fake filesystem with the ability to add/remove files. A full fake filesystem resembling a Debian 5.0 installation is included
Possibility of adding fake file contents so the attacker can 'cat' files such as /etc/passwd. Only minimal file contents are included
Session logs stored in an UML compatible format for easy replay with original timings
Just like Kojoney, Kippo saves files downloaded with wget for later inspection
Trickery; ssh pretends to connect somewhere, exit doesn't really exit, etc
</blockquote>comment:www.metafilter.com,2011:site.101448-3569980Fri, 11 Mar 2011 08:52:41 -0800Foci for AnalysisBy: k5.user
http://www.metafilter.com/101448/Cracking-voyeurism#3569995
so, now I'm curious, how rigorous/secure is kippo ? The articles say it's a honeypot, shell of a shell.. Does it have any vulnerabilities ?comment:www.metafilter.com,2011:site.101448-3569995Fri, 11 Mar 2011 08:58:08 -0800k5.userBy: zamboni
http://www.metafilter.com/101448/Cracking-voyeurism#3569998
Looks like we've hosed kippo.rpg.fi (the "by" and "nincompoop" links).comment:www.metafilter.com,2011:site.101448-3569998Fri, 11 Mar 2011 08:59:30 -0800zamboniBy: routergirl
http://www.metafilter.com/101448/Cracking-voyeurism#3570002
The most amusing thing about this (besides the constant retry of "perl") is that one of the related videos is "<a href="http://www.youtube.com/watch?v=SXmv8quf_xM&feature=related">How to view other computers' IP addresses</a>," which is a video that purports you can get IPs of people looking at a site by trace routing to it from a cmd prompt. The kid trace routes to google.com and claims the ten IPs showing up are all people viewing Google. That made me giggle.comment:www.metafilter.com,2011:site.101448-3570002Fri, 11 Mar 2011 09:00:07 -0800routergirlBy: equalpants
http://www.metafilter.com/101448/Cracking-voyeurism#3570003
Oh, god, I love that some people actually respond "y" to the owl prompt, and that it replies with "NO WAI!". Priceless.comment:www.metafilter.com,2011:site.101448-3570003Fri, 11 Mar 2011 09:00:30 -0800equalpantsBy: George_Spiggott
http://www.metafilter.com/101448/Cracking-voyeurism#3570005
<i>Does it have any vulnerabilities ?</i>
What a strange thing to ask. if anyone here knew about any vulnerabilities in klippo, the script kiddies would too and it'd be useless.comment:www.metafilter.com,2011:site.101448-3570005Fri, 11 Mar 2011 09:02:21 -0800George_SpiggottBy: routergirl
http://www.metafilter.com/101448/Cracking-voyeurism#3570011
Ok, I take it back. The owl prompt and the reactions to it are really quite funny.comment:www.metafilter.com,2011:site.101448-3570011Fri, 11 Mar 2011 09:04:25 -0800routergirlBy: k5.user
http://www.metafilter.com/101448/Cracking-voyeurism#3570018
given the competency demonstrated by most of the logged folks, yeah, I wouldn't worry about it too much..
But, at least one person did figure out the system was a honeypot and walked away, I wouldn't be openly running a honeypot with out some serious consideration about the honeypot software.. (Now that opens the question the guy that figured it out, since we only get a small part of the log where he cusses out the operator, did the hacker go on to other lower-hanging fruit ? And if the hacker were of the destructive mindset, might have looked into the software to see what it's vulnerabilities are..)comment:www.metafilter.com,2011:site.101448-3570018Fri, 11 Mar 2011 09:08:15 -0800k5.userBy: ChrisHartley
http://www.metafilter.com/101448/Cracking-voyeurism#3570019
These are hilarious, thank you for the links.
<a href="http://denyhosts.sourceforge.net/">denyhosts</a> is similar to fail2ban but uses the crowd to watch and report attacks as they happen, preemptively blocking them once they reach a certain threshold.comment:www.metafilter.com,2011:site.101448-3570019Fri, 11 Mar 2011 09:08:42 -0800ChrisHartleyBy: special-k
http://www.metafilter.com/101448/Cracking-voyeurism#3570022
I don't really follow what's going on but let me just say you guys are so adorable especially with those cute little owls.comment:www.metafilter.com,2011:site.101448-3570022Fri, 11 Mar 2011 09:09:30 -0800special-kBy: Nelson
http://www.metafilter.com/101448/Cracking-voyeurism#3570036
I wonder if some of the stupid behaviour we're seeing is the result of attacks that are semi-automated. I imagine there are tools to help facilitate hacking many boxes quickly, in parallel, with macros.comment:www.metafilter.com,2011:site.101448-3570036Fri, 11 Mar 2011 09:16:39 -0800NelsonBy: Threeway Handshake
http://www.metafilter.com/101448/Cracking-voyeurism#3570040
<em>(Now that opens the question the guy that figured it out, since we only get a small part of the log where he cusses out the operator, did the hacker go on to other lower-hanging fruit ? And if the hacker were of the destructive mindset, might have looked into the software to see what it's vulnerabilities are..)</em>
You are totally missing the point of a <em>honeypot</em>.comment:www.metafilter.com,2011:site.101448-3570040Fri, 11 Mar 2011 09:19:13 -0800Threeway HandshakeBy: mcstayinskool
http://www.metafilter.com/101448/Cracking-voyeurism#3570043
I would agree, Nelson, except for the fact that one of those hackers tried responding to the owl several times. Responses included "O", "RLY", "YES", and my favorite "oui" (because clearly O RLY is au Francais). No computer is that stupid.comment:www.metafilter.com,2011:site.101448-3570043Fri, 11 Mar 2011 09:20:44 -0800mcstayinskoolBy: Osrinith
http://www.metafilter.com/101448/Cracking-voyeurism#3570049
For the sake of compare/contrast, does anyone have a link to a video showing a <em>good</em> hacker at work? It's just that I have very little comprehension of what goes on in the nuts and bolts of hacking (at the level of code) and would be interested to see it in action.comment:www.metafilter.com,2011:site.101448-3570049Fri, 11 Mar 2011 09:24:01 -0800OsrinithBy: lumpenprole
http://www.metafilter.com/101448/Cracking-voyeurism#3570050
<i>No computer is that stupid.</i>
Clearly, you never had to admin a windows NT box.comment:www.metafilter.com,2011:site.101448-3570050Fri, 11 Mar 2011 09:24:24 -0800lumpenproleBy: Foci for Analysis
http://www.metafilter.com/101448/Cracking-voyeurism#3570053
Oh absolutely, Nelson; automated attacks are everyday stuff. On the production server that I manage we get hundreds of attacks each day - and that's pretty normal if you <a href="http://serverfault.com/questions/244614/is-it-normal-to-get-hundreds-of-break-in-attempts-per-day">ask around the web</a>. I don't, however, believe that these logged attacks were automated, they are too lazy and stupid. I mean, typing mikdir instead of mkdir?!comment:www.metafilter.com,2011:site.101448-3570053Fri, 11 Mar 2011 09:25:10 -0800Foci for AnalysisBy: Ad hominem
http://www.metafilter.com/101448/Cracking-voyeurism#3570063
Dunno, if I was a hacker and I kept running into these kippo honeypots I would grab the kippo source and look for vulnerabilities. It is no different than any other daemon and kippo running on port 22 has got to have root privs to bind to that port. Does it run through Inetd or some sort of modern equivalent?
I haven't looked that the source but it is using twisted so that makes it python right?comment:www.metafilter.com,2011:site.101448-3570063Fri, 11 Mar 2011 09:28:27 -0800Ad hominemBy: Threeway Handshake
http://www.metafilter.com/101448/Cracking-voyeurism#3570065
<em>does anyone have a link to a video showing a good hacker at work?
</em>
<a href="http://www.youtube.com/watch?v=x3XzPhdBx9g">Try this
</a>comment:www.metafilter.com,2011:site.101448-3570065Fri, 11 Mar 2011 09:28:48 -0800Threeway HandshakeBy: Ad hominem
http://www.metafilter.com/101448/Cracking-voyeurism#3570068
Hahah Hack The Planet.comment:www.metafilter.com,2011:site.101448-3570068Fri, 11 Mar 2011 09:30:01 -0800Ad hominemBy: Threeway Handshake
http://www.metafilter.com/101448/Cracking-voyeurism#3570072
<em>Does it run through Inetd or some sort of modern equivalent?
</em>
Kippo is not a daemon: it uses Twistd's (python) ssh server. So good luck with that.comment:www.metafilter.com,2011:site.101448-3570072Fri, 11 Mar 2011 09:30:59 -0800Threeway HandshakeBy: Foci for Analysis
http://www.metafilter.com/101448/Cracking-voyeurism#3570074
Osrinith, while not this visual or detailed, the story of how Anonymous compromised HBGary's servers is interesting. Ars ran <a href="http://arstechnica.com/tech-policy/news/2011/03/hbgaryanonymous-special-report.ars">several stories</a> on the attacks (no need to buy the e-book, all articles are below Further reading).
What really intrigues me about the HBGary saga? The initial attack vector was a CMS and pretty much everything Anon did was 101 stuff.comment:www.metafilter.com,2011:site.101448-3570074Fri, 11 Mar 2011 09:31:35 -0800Foci for AnalysisBy: George_Spiggott
http://www.metafilter.com/101448/Cracking-voyeurism#3570082
<i>It is no different than any other daemon and kippo running on port 22 has got to have root privs to bind to that port. </i>
You can be sure it runs on another port and the launcher forwards port 22 to it. Anybody who writes a honeypot that runs as root (or any other well-known user with any privileges to speak of) should find a new line of work.comment:www.metafilter.com,2011:site.101448-3570082Fri, 11 Mar 2011 09:34:13 -0800George_SpiggottBy: ErikaB
http://www.metafilter.com/101448/Cracking-voyeurism#3570108
<a href="http://www.metafilter.com/101448/Cracking-voyeurism#3570049">Osirinth</a>, that's why it's funny (to those of us it's funny to).
These logs don't show people comparing badly to "real" hackers. They show people comparing badly to <i>completely inept everyday users.</i>
Imagine watching someone attempting to steal a bike. First they examine it thoughtfully for several minutes, while poking at bits of the frame and nodding sagely. Then they pull the brake lever several times, and finish by shuffling their feet quickly.
Maybe once or twice someone actually gets a leg up and over the frame, and you cheer for them a bit inside. But then they fail to grasp the purpose of the pedals, and sit on the seat backwards, and fall off.
And then you laugh and come here and post something like, "Hilarious!"comment:www.metafilter.com,2011:site.101448-3570108Fri, 11 Mar 2011 09:42:55 -0800ErikaBBy: Threeway Handshake
http://www.metafilter.com/101448/Cracking-voyeurism#3570109
<em>You can be sure it runs on another port and the launcher forwards port 22 to it.
</em>
You make it run on any unprivileged port, through Twistd. Again, Kippo is not a daemon, it is a fake, jailed, shell that people can connect to through the twistd ssh server.comment:www.metafilter.com,2011:site.101448-3570109Fri, 11 Mar 2011 09:43:14 -0800Threeway HandshakeBy: Ad hominem
http://www.metafilter.com/101448/Cracking-voyeurism#3570111
Ok now that I look at the site it uses iptables to forward port 22 so you are right that it probably has no privs. It can still write to the filesystem, probably not much you can do with that since there is no way for the attacker to control anything beyond the contents of the log files. So what about whatever the admin will be using to read the log files?comment:www.metafilter.com,2011:site.101448-3570111Fri, 11 Mar 2011 09:43:25 -0800Ad hominemBy: Faint of Butt
http://www.metafilter.com/101448/Cracking-voyeurism#3570116
<code>
___
{o,o}
|)__)
-"-"-
O RLY?
</code>comment:www.metafilter.com,2011:site.101448-3570116Fri, 11 Mar 2011 09:44:27 -0800Faint of ButtBy: Threeway Handshake
http://www.metafilter.com/101448/Cracking-voyeurism#3570121
<em>So what about whatever the admin will be using to read the log files?</em>
I'm pretty sure vi, tail, cat, and the like won't go and run arbitrary code out of a logfile format.comment:www.metafilter.com,2011:site.101448-3570121Fri, 11 Mar 2011 09:46:59 -0800Threeway HandshakeBy: ChrisHartley
http://www.metafilter.com/101448/Cracking-voyeurism#3570125
The <a href="http://www.youtube.com/watch?v=ojFFS_T3UQk">hacking scene</a> from one of the Matrix movies where Trinity shuts down the power grid was (surprisingly) fairly realistic. Here is <a href="http://www.davidc.net/~david/matrixhack.html">a transcript</a>.
She uses nmap to scan for open ports, then runs a script to exploit what was a real vulnerability in the ssh daemon to reset the root password, then she ssh's in and shuts down the power grid. If that doesn't help explain things just imagine that she walked around the perimeter of a building looking for doors, found one and then jimmied the faulty lock with a credit card.
I like to picture these keystone cops hackers wearing black leather suits while typing "mikdir" in the honeypot.comment:www.metafilter.com,2011:site.101448-3570125Fri, 11 Mar 2011 09:47:23 -0800ChrisHartleyBy: Ad hominem
http://www.metafilter.com/101448/Cracking-voyeurism#3570134
<em>I'm pretty sure vi, tail, cat, and the like won't go and run arbitrary code out of a logfile format.</em>
You are right, dumber things have happened though. I once got a logging until to overwrite /etc/crontab with arbitrary crap. That was in the stone ages though.comment:www.metafilter.com,2011:site.101448-3570134Fri, 11 Mar 2011 09:50:29 -0800Ad hominemBy: Osrinith
http://www.metafilter.com/101448/Cracking-voyeurism#3570155
Thanks for the good examples, everyone. Le sigh. Despite being a child of the 80s and 90s and growing up with the internet, I completely missed out on the basic computer programming skills. I'm a fairly tech-savvy person, but only at the GUI level. Command line stuff makes me feel like a monkey with a stick.comment:www.metafilter.com,2011:site.101448-3570155Fri, 11 Mar 2011 09:59:55 -0800OsrinithBy: k5.user
http://www.metafilter.com/101448/Cracking-voyeurism#3570160
<blockquote>Anybody who writes a honeypot that runs as root</blockquote>
Note that the launcher for kippo checks for this and bails if you try to run as root..
And we could argue semantics because the person who writes it ain't the guy running it .. (ie we're laughing here at the folks 'running' hacks/scripts..).
But, given python, twisted, etc, are they known strong ? No funny crafted packets to send it off the deep end ? (most of my security works deal with non-interpreted languages, but google says python isn't immune from buffer overflows..)comment:www.metafilter.com,2011:site.101448-3570160Fri, 11 Mar 2011 10:03:07 -0800k5.userBy: Threeway Handshake
http://www.metafilter.com/101448/Cracking-voyeurism#3570163
<em>You are right, dumber things have happened though.
</em>
Yes, dumber things happen, and feel free to look at the source code for the jailed shell runs as an unpriv user. And also the server daemon that is from python for all of its vulns. If you find any, let everybody know!
Hamburger. But anyway, it sure seems silly to heap all of this "WHAT IF TEH HONEYPOTZ ARE HAXD?" on this, but similar things aren't asked of other stuff, like say, every other program in the entire world?comment:www.metafilter.com,2011:site.101448-3570163Fri, 11 Mar 2011 10:03:24 -0800Threeway HandshakeBy: spiderskull
http://www.metafilter.com/101448/Cracking-voyeurism#3570175
Haha, thanks for the morning laughter. We're constantly dealing with this kind of nonsense at the university (they want to use our machines to spend spam over the massively quick internet connection). We've similarly setup honeypots, although slightly more asshole-y -- they actually believe they're in root when they're in a sandbox, ruining a completely useless piece of the file system.comment:www.metafilter.com,2011:site.101448-3570175Fri, 11 Mar 2011 10:08:12 -0800spiderskullBy: Threeway Handshake
http://www.metafilter.com/101448/Cracking-voyeurism#3570184
Also, I really need to say that the fake exit command which looks like you've disconnected but really actually keeps you in the shell is the most hilarious thing ever. When I originally set one of these up and tested it out to make sure it worked, it 100% fucking fooled me, and the logfile probably would look really funny to anybody looking at is when suddenly my "own system" was acting incredibly strange.
The thing about a honeypot like this is that it would make anybody seem comical -- anybody who didn't realize they're in a fake honeypot shell. Somebody brought up a stolen bike analogy, but this would be more like if say, Lance Armstrong were to steal a bike, and when he got on and pedaled, oh, I don't know, the bike wheels spun backwards, and turning right would make the bike go left.comment:www.metafilter.com,2011:site.101448-3570184Fri, 11 Mar 2011 10:10:41 -0800Threeway HandshakeBy: Ad hominem
http://www.metafilter.com/101448/Cracking-voyeurism#3570199
Ok ok I give up. Things running exposed to the Internet should get far more scrutiny than most programs though.comment:www.metafilter.com,2011:site.101448-3570199Fri, 11 Mar 2011 10:16:55 -0800Ad hominemBy: steef
http://www.metafilter.com/101448/Cracking-voyeurism#3570203
I gotta change my password.comment:www.metafilter.com,2011:site.101448-3570203Fri, 11 Mar 2011 10:17:48 -0800steefBy: Threeway Handshake
http://www.metafilter.com/101448/Cracking-voyeurism#3570216
<em>Things running exposed to the Internet
</em>
So basically, every single program on every computer?comment:www.metafilter.com,2011:site.101448-3570216Fri, 11 Mar 2011 10:20:50 -0800Threeway HandshakeBy: Ad hominem
http://www.metafilter.com/101448/Cracking-voyeurism#3570252
<em>So basically, every single program on every computer?</em>
You know what I mean. Programs accepting connections from anyone with an ssh client.
I'm not sure why you think it is so nuts to put some thought into how one would attack kibbo even as a thought exercise.comment:www.metafilter.com,2011:site.101448-3570252Fri, 11 Mar 2011 10:37:22 -0800Ad hominemBy: Skorgu
http://www.metafilter.com/101448/Cracking-voyeurism#3570270
Actually Ad hominem is totally right. Any program that accepts data from the world must be treated as suspect and <a href='http://www.ossec.net/main/attacking-log-analysis-tools'>log analysis tools</a> have been attacked before.
That said it's a rather small attack surface and trivially easy to mitigate by doing your analysis in a jail/chroot/vm/whatever.comment:www.metafilter.com,2011:site.101448-3570270Fri, 11 Mar 2011 10:46:26 -0800SkorguBy: George_Spiggott
http://www.metafilter.com/101448/Cracking-voyeurism#3570346
Eenie, meenie, chili beanie, give root to this attacking meanie
(Just invoked a secret backdoor in your browser with that incantation... Christ, you sure have a lot of porn in your cache.)comment:www.metafilter.com,2011:site.101448-3570346Fri, 11 Mar 2011 11:21:32 -0800George_SpiggottBy: evidenceofabsence
http://www.metafilter.com/101448/Cracking-voyeurism#3570591
<i>because clearly O RLY is au Francais</i>
<a href="http://en.wikipedia.org/wiki/Paris-Orly_Airport">Oui!</a>comment:www.metafilter.com,2011:site.101448-3570591Fri, 11 Mar 2011 12:47:29 -0800evidenceofabsenceBy: kenko
http://www.metafilter.com/101448/Cracking-voyeurism#3570756
<em>Again, Kippo is not a daemon</em>
Twisted has facilities to fork twice, close file descriptors, set the process group, and all that jazz, and normally if you've got a long-running Twisted program you'll invoke twistd with options to do that stuff automatically, so I'm not sure why you're so confident that Kippo isn't a daemon.comment:www.metafilter.com,2011:site.101448-3570756Fri, 11 Mar 2011 13:41:10 -0800kenkoBy: Threeway Handshake
http://www.metafilter.com/101448/Cracking-voyeurism#3571576
Fine, everybody. The next time somebody posts something about a new car or whatever, i'm going to jack the thread and derail it into a discussion about how somebody could drive it off a cliff.comment:www.metafilter.com,2011:site.101448-3571576Fri, 11 Mar 2011 20:20:21 -0800Threeway HandshakeBy: free hugs
http://www.metafilter.com/101448/Cracking-voyeurism#3572452
How about: when there's a thread about an anti-theft device for cars that lets a car thief get into your car and videotapes him, you post and say "any chance the dude could still figure out how to get that car running?"comment:www.metafilter.com,2011:site.101448-3572452Sat, 12 Mar 2011 08:32:27 -0800free hugsBy: heathkit
http://www.metafilter.com/101448/Cracking-voyeurism#3573069
My favorite hacking story goes back to college. I was working on the disk image for a robot for my school's entry in an autonomous underwater vehicle competition. The target hardware ( a small embedded x86 board ) mounted its root file system over NFS from a host machine. The host machine also had a serial console into the board - I could ssh into the host machine and pretty much do whatever.
At the time, I had an unhealthy obsession with being able to work from starbucks. At first this was fine - the host machine was a basic debian install, and the only service running was ssh. However, eventually I got the video capture working and wanted to stream video from the lab. There are safe ways to do this, but being young and foolish I just asked the school's IT department to put the target machine on the internet.
The root password for the target was "root". In less than a day of being exposed to the public internet, it had been breached. I probably wouldn't even have noticed, but luckily they changed the root password. Luckily, I was able to blow away the root file system from the host machine and shut it down remotely, but that was pretty embarrassing. It's not surprising to me that it got hacked - I'm just surprised it happened so darn quickly.
tldr; before you put your autonomous sub on the internet, make sure it has a good passwordcomment:www.metafilter.com,2011:site.101448-3573069Sat, 12 Mar 2011 16:07:44 -0800heathkitBy: Threeway Handshake
http://www.metafilter.com/101448/Cracking-voyeurism#3577495
<em>How about: when there's a thread about an anti-theft device for cars that lets a car thief get into your car and videotapes him, you post and say "any chance the dude could still figure out how to get that car running?"</em>
Honeypots and tarpits are not security measures.comment:www.metafilter.com,2011:site.101448-3577495Mon, 14 Mar 2011 16:46:03 -0800Threeway Handshake
"Yes. Something that interested us yesterday when we saw it." "Where is she?" His lodgings were situated at the lower end of the town. The accommodation consisted[Pg 64] of a small bedroom, which he shared with a fellow clerk, and a place at table with the other inmates of the house. The street was very dirty, and Mrs. Flack's house alone presented some sign of decency and respectability. It was a two-storied red brick cottage. There was no front garden, and you entered directly into a living room through a door, upon which a brass plate was fixed that bore the following announcement:¡ª The woman by her side was slowly recovering herself. A minute later and she was her cold calm self again. As a rule, ornament should never be carried further than graceful proportions; the arrangement of framing should follow as nearly as possible the lines of strain. Extraneous decoration, such as detached filagree work of iron, or painting in colours, is [159] so repulsive to the taste of the true engineer and mechanic that it is unnecessary to speak against it. Dear Daddy, Schopenhauer for tomorrow. The professor doesn't seem to realize Down the middle of the Ganges a white bundle is being borne, and on it a crow pecking the body of a child wrapped in its winding-sheet. 53 The attention of the public was now again drawn to those unnatural feuds which disturbed the Royal Family. The exhibition of domestic discord and hatred in the House of Hanover had, from its first ascension of the throne, been most odious and revolting. The quarrels of the king and his son, like those of the first two Georges, had begun in Hanover, and had been imported along with them only to assume greater malignancy in foreign and richer soil. The Prince of Wales, whilst still in Germany, had formed a strong attachment to the Princess Royal of Prussia. George forbade the connection. The prince was instantly summoned to England, where he duly arrived in 1728. "But they've been arrested without due process of law. They've been arrested in violation of the Constitution and laws of the State of Indiana, which provide¡ª" "I know of Marvor and will take you to him. It is not far to where he stays." Reuben did not go to the Fair that autumn¡ªthere being no reason why he should and several why he shouldn't. He went instead to see Richard, who was down for a week's rest after a tiring case. Reuben thought a dignified aloofness the best attitude to maintain towards his son¡ªthere was no need for them to be on bad terms, but he did not want anyone to imagine that he approved of Richard or thought his success worth while. Richard, for his part, felt kindly disposed towards his father, and a little sorry for him in his isolation. He invited him to dinner once or twice, and, realising his picturesqueness, was not ashamed to show him to his friends. Stephen Holgrave ascended the marble steps, and proceeded on till he stood at the baron's feet. He then unclasped the belt of his waist, and having his head uncovered, knelt down, and holding up both his hands. De Boteler took them within his own, and the yeoman said in a loud, distinct voice¡ª HoME²¨¶àÒ°´²Ï·ÊÓÆµ ѸÀ×ÏÂÔØ ѸÀ×ÏÂÔØ
ENTER NUMBET 0016www.mallbao.com.cn epaychain.com.cn www.lingteng.net.cn www.sfywyt.com.cn svenya.com.cn www.oojoo.com.cn nedoo.com.cn www.svnews.com.cn www.tgchain.com.cn www.xfgcw.com.cn