## Java network connection on Debian:SID

The unstable release of Debian is of course tricky in a lot of cases, so there is also a little stumbling stone on your path of Java network programming. On every new system it annoys me.

Before I wrongful blame my preferred Debian release called Sid I have to acknowledge I don’t know whether this feature is also available in other releases… Here is a small program to test/reproduce:

Compilation shouldn’t fail, but if you try to launch it you’ll get an exception like that:

This is caused by one little line in /etc/sysctl.d/bindv6only.conf saying you want to explicitly bind via IPv6. But my connection (maybe yours too) communicates still over IPv4, so this method of networking of course fails. To change this behavior you have to choose between two solutions.

### Solution 1: Permanent modification (needs to be root)

You can change this behavior for the whole system by editing the file /etc/sysctl.d/bindv6only.conf :

After that just type invoke-rc.d procps restart in your terminal to let your changes take effect. Your next run should work fine.

### Solution 2: Change it for this single example

If your are not allowed to change system settings, you can add -Djava.net.preferIPv4Stack=true to your execution command:

This causes your actual runtime to connect the network via IPv4, no matter to system preferences. I hope this could save some time of developers like me ;-)

## You don't know the flash-trick?

Just sitting around with Micha on a SunRay (maybe meanwhile OracleRay?). He is surfing through the web until his session seems to hang and he said:

Fuck FLASH!! Need the flash-trick...

I didn’t heard about that trick before, but now he told me that feature.

If Flash kills your SunRay session you have to type Ctrl+Alt+Moon , relogin and your session will revive. With running Flash!

As far as I know this happens very often when he is using his browser because unfortunately the whole web is contaminated with this fucking Flash… The Flash-Trick is very nice, but a flashblock plugin would be more user friendly!?

## Playing around with SUN Spots

My boss wants to present some cool things in a lecture that can be done with SUN Spots. I'm selected to program these things and now I have three of them to play a little bit.

The installation was basically very easy, all you should know is that there is no chance for 64bit hosts and also Virtual Box guests don't work as expected, virtual machines lose the connection to the Spot very often... So I had to install a 32bit architecture on my host machine (btw. my decision was a Sidux Μόρος).

If a valid system is found, the rest is simple. Just download the SPOTManager from sunspotworld.com, that helps you installing the Sun SPOT Software Development Kit (SDK). If it is done connect a Sport via USB, open the SPOTManager and upgrade the Spot's software (it has to be the same version as installed on your host). All important management tasks can be done with this tool and it is possible to create virtual Spots.

Additionally to the SDK you'll get some demos installed, interesting and helpful to see how things work. In these directories ant is configured to do that crazy things that can be done with the managing tool. Here are some key targets:

A basestation is able to administrate other Spots, so you don't have to connect each to your machine.

Ok, how to do own stuff?
There are some Netbeans plugins that makes live easier, but I don't like that big IDE's that are very slow and bring a lot of overhead to your system. To create an IDE independent project that should run on a Spot you need an environment containing:

• File: ./resources/META-INF/MANIFEST.MF
• File: ./build.xml
• Directory: ./src
Here you can place your source files

And now you can just type ant and the project will be deployed to the Spot.
A project that should run on your host communicating with other spots through the basestation needs a different environment:

• File: ./build.xml
• Directory: ./src
Here you can place your source files

Ok, that's it for the moment. I'll report results.

## April fools month

About one month ago, it was April 1st, I attached two more lines to the .bashrc of Rumpel (he is co-worker and has to operate that day).

These two lines you can see here:

With each appearance of the bash prompt this command paints one pixel in the console with a random color. No respect to important content beyond this painting. That can really be annoying and he was always wondering why this happens! For more than one month, until now!

Today I lift the secret, so Rumpel, I’m very sorry ;)

## Converting videos to images

I just wanted to split a video file in each single frame and did not find a program that solves this problem. A colleague recommended videodub, but when I see DLL’s or a .exe I get insane! I’ve been working a little bit with OpenCV before and coded my own solution, containing only a few lines.

The heart of my solution consists of the following 13 lines:

It just queries each frame of the AVI and writes it to an image file. Thus, not a big deal.

The complete code can be downloaded here. All you need is OpenCV and a C++ compiler:

Just start it with for example:

If you prefer JPG images (or other types) just change the extension string form .png to .jpg .

## From distance matrix to binary tree

In one of our current exercises we have to prove different properties belonging to distance matrices as base of binary trees. Additionally I tried to develop an algorithm for creating such a tree, given a distance matrix.

A distance matrix $D \in \mathbb{R}^{N,N}$ represents the dissimilarity of $N$ samples (for example genes), so that the number in the i-th row j-th column is the distance between element i and j. To generate a tree of it, it is necessary to determine some attributes of the distance $d(x,y):\mathbb{R}^n \times \mathbb{R}^n \rightarrow \mathbb{R}$ between two elements so that it is a metric:

1. $d(x, y) \ge 0$ (distances are positive)
2. $d(x, y) = 0 \Leftrightarrow x = y$ (elements with distance 0 are identical, dissimilar elements have distances greater than 0)
3. $d(x, y) = d(y, x)$ (symmetry)
4. $d(x, z) \le d(x, y) + d(y, z)$ (triangle inequality)

Examples for valid metrics are the euclidean distance $\sqrt{\sum_{i=1}^n (x_i-y_i)^2}$, or the manhattan distance $\sum_{i=1}^n \|x_i-y_i\|$.

The following procedure is called hierarchical clustering, we try to combine single objects to cluster. At the beginning we start with $N$ cluster, each of them containing only one element, the intersection of this set is empty and the union contains all elements that should be clustered.

The algorithm now searches for the smallest distance in $D$ that is not 0 and merges the associated clusters to a new one containing all elements of both. After that step the distance matrix should be adjusted, because two elements are removed and a new one is added. The distances of the new cluster to all others can be computed with the following formula:

$X, Y$ are two clusters that should be merged, $R$ represents another cluster. The constants $\alpha, \beta, \gamma, \delta$ depend on the cluster method to use, shown in table 1.

Table 1: Different cluster methods
Method $$\alpha$$ $$\beta$$ $$\gamma$$ $$\delta$$
Single linkage 0.5 0.5 0 -0.5
Complete linkage 0.5 0.5 0 0.5
Average linkage 0.5 0.5 0 0
Average linkage (weighted) $$\frac{|X|}{|X| + |Y|}$$ $$\frac{|Y|}{|X| + |Y|}$$ 0 0
Centroid $$\frac{|X|}{|X| + |Y|}$$ $$\frac{|Y|}{|X| + |Y|}$$ $$-\frac{|X|\cdot|Y|}{(|X| + |Y|)^2}$$ 0
Median 0.5 0.5 -0.25 0

Here $\|X\|$ denotes the number of elements in cluster $X$.

The algorithm continues with searching for the smallest distance in the new distance matrix and will merge the next two similar elements until just one element is remaining.
Merging of two clusters in tree-view means the construction of a parent node with both clusters as children. The first clusters containing just one element are leafs, the last node is the root of the tree.

## Small example

Let’s create a small example from the distance matrix containing 5 clusters, see table 2.

Table 2: Start distances
A B C D E
A 0 5 2 1 6
B 5 0 3 4 1.5
C 2 3 0 1.5 4
D 1 4 1.5 0 5
E 6 1.5 4 5 0

A and D are obviously the most similar elements in this matrix, so we merge them. To make the calculation easier we take the average linkage method to compute the new distances to other clusters:

$d(B,[A+D]) = \frac{d(B, A) + d(B, D)}{2} = \frac{5 + 4}{2} = 4.5$
$d(C,[A+D]) = \frac{d(C, A) + d(C, D)}{2} = \frac{2 + 1.5}{2} = 1.75$
$d(E,[A+D]) = \frac{d(E, A) + d(E, D)}{2} = \frac{6 + 5}{2} = 5.5$

With these values we are able to construct the new distance matrix of 4 remaining clusters, shown in table 3.

Table 3: Cluster after 1st iter.
A,D B C E
A,D 0 4.5 1.75 5.5
B 4.5 0 3 1.5
C 1.75 3 0 4
E 5.5 1.5 4 0

This matrix gives us the next candidates for clustring, B and E with a distance of 1.5.

$d([A+D], [B+E]) = \frac{d([A+D], B) + d([A+D], E)}{2} = \frac{4.5 + 5.5}{2} = 5$
$d(C,[B+E]) = \frac{d(C, B) + d(C, E)}{2} = \frac{3 + 4}{2} = 3.5$

With the appropriate distance matrix of table 4.

Table 4: After 2nd iter.
A,D B,E C
A,D 0 5 1.75
B,E 5 0 3.5
C 1.75 3.5 0

Easy to see, now we cluster [A+D] with C:

and obtain a last distance matrix with table 5.

Table 4: Final matrix
A,C,D B,E
A,C,D 0 4.25
B,E 4.25 0

Needless to say, further calculations are trivial. There are only to clusters left and the combination of them gives us the final cluster containing all elements and the root of the desired tree.
The final tree is shown in figure 1. You see, it is not that difficult as expected and ends in a beautiful image!

## Remarks

If $D$ is defined as above there is no guarantee that edge weights reflect correct distances! When you calculate the weights in my little example you’ll see what I mean. If this property is desired the distance function $d(x,y)$ has to comply with the condition of ultrametric inequality: $d(x, z) \le \max {d(x, y),d(y, z)}$.

The method described above is formally known as agglomerative clustering, merging smaller clusters to a bigger one. There is another procedure that splits bigger clusters into smaller ones, starting with a cluster that contains all samples. This method is called divisive clustering.

## n3rd goes mainstream

Neither hallucinations nor does anybody drugged your coffee, what you see is real!

I leave my old self-made blog and move to the content management system Wordpress due to various reasons. My schedule doesn’t allow profound modification to get some important features that Wordpress gives me for free. Behind this solution a lot of developer are working on this open source project and there are a huge bunch of plugins and for probably any problem Wordpress and its plugin developers offers a solution.

The layout is chosen to be simple and clear, just like my previous blog, and important: It is valid! Maybe by the time I’ll port some of the older entries to this new blog, to get them listed between search results.

There is on additional improvement. I’ll try to overcome my inner pigdog lack of will power and compose some articles in English. I hope it will tweak my language abilities. If you find some mistakes, please correct me!

So, lets start!

## Faking proxy via SSH tunnel

Some content isn’t available for every one, e.g. our frontends for administration at the university are only accessible with special IP’s. A similar problem is the download of scientific paper from platforms like PubMed or Oxford Journals. Our university subscribed to these journals, but unless there is a SSO like Shibboleth they are just available from inside the university network. If I want to download such a publication from home I need to pay about US$30 or have to go to an university computer and get it there because there is no proxy available at our university. But there must be workaround to surf with an university IP from home! And it is! All you need is an account for an *nix system at your company/library/university or whatever! Just create a SSH tunnel to it: -D8080 defines the entrance point of the tunnel, in this example it is port 8080. Every other port (that is not yet in use) is possible, but remember that you need to be root to use ports below 1024. Now a SOCKS5 proxy is emulated by SSH. This SOCKS proxy will routes network packages from your localhost to a server through SERVER.WITH.PREFFERED.IP . To apply it just configure your browser to use the proxy at localhost:8080 and check your IP address at any service like this one. But it’s a lot to do for just downloading a simple PDF, isn’t it? That need improvements! The main work is to configuring the browser, for example Firefox needs 6 clicks and some keyboard inputs. That’s nasty, but there is a add-on called Foxy Proxy that manages different proxy settings through an icon on the status bar of Firefox. It’s also able to use SOCKS proxies and you can define regex-lists to use different proxys for special URL’s. This speeds up the switching between different proxies. For other browsers you might find similar solutions. To optimize the creation of the tunnel you can first prepare SSH-keys without a passphrase and create a script containing: This script will create the tunnel (hence the SOCKS proxy) when it’s executed. So if you want a permanent tunnel you can call it from your $HOME/.loginrc or any other file that is executed when you login. Alternatively you can write a start-script…

## Git repository hosting with Debian

This is a translation of my German entry.

Until now I managed my code/work with Subversion and all was very well, but I decided to move to a distributed revision control system. Calling spade as a spade my choice was Git.

After some tests I had the problem, that there is (basically) no central repository where everyone can commit changes, but I’m working with other guys on homework/projects. So how to centralize a distributed revision control system? Nothing easier than that!

## Server set up

Software of choice is called gitosis, so install the following:

Gitosis will manage repositories and privileges on the repository server. The installation progress will add a new user to your system called gitosis (see /etc/passwd ). To initialize the master repository that will manage the rest just copy the SSH public key of your local account to /tmp/id_rsa.pub and do the following:

That’s it on the server, now you have a head-repository and you can manage everything on your local machine.

## Managing the manage-repository

Right back on your local machine you also have to install Git:

Now you’re able to check out the previous created managing repository that knows your SSH key:

The directory keydir holds known SSH keys from users that will work with you, gitosis.conf is the managing file. It is nearly empty on creation and may look like this:

To add a new repository just type something like this:

And to create a new group of users:

New users should give you their public key, so you can save it in the keydir directory with a name like user@host.pub . To commit the changes you’ve made type the following:

Now everybody that was enabled is allowed to checkout your projects. To initiate a new project you can do the following:

To commit a first file:

Voila, there is your repository! Check it out, change it, branch it, you know what to do!

## Publish a repository

With this configuration only you and a bunch of people can see what you are doing in your spare time, but what if you want to publish you work? You can create a git daemon that listens on port 9418 of your server, waiting for a user who wants clone your code:

This service will serve any repository content if you create a file called $REPOSITORYHOME/git-daemon-export-ok in this repository (content isn’t necessary). Everybody knows that such a daemon tends to die sometimes, so I created a cronjob: Now everybody can clone repositories with that special file that allows public cloning by: That’s it! not that difficult but one has to know what to do! Have fun with your repository. ## SSH authentication via public key This is a translation of my German article. SSH is a secure way to connect to a remote system, e.g. for administration or remote working. The communication between these two workstations is encrypted, so an enemy is not able to intercept/spy on the transferred data. Although the password that is sent to access the other system is encrypted, it’s still possible to brute force it. To decrease this risk one can turn off password authentication and just allow the authentication via SSH keys, so that the access is only possible for people that have a specific private keys. It is much harder to guess such a private key than guessing a password. To create such a key pair, containing a private and a public key, just run ssh-keygen -t rsa -b 4096 in your terminal. This command will create an RSA-key width 4096 bits (the more bits the harder to guess the key). The output may look like this: Generating public/private rsa key pair. Enter file in which to save the key (/home/user/.ssh/id_rsa): Created directory '/home/user/.ssh'. Enter passphrase (empty for no passphrase): Enter same passphrase again: Your identification has been saved in /home/user/.ssh/id_rsa. Your public key has been saved in /home/user/.ssh/id_rsa.pub. The key fingerprint is: 16:59:cb:9f:55:b1:39:ee:b3:72:14:19:13:5c:60:4d user@abakus The key's randomart image is: +--[ RSA 4096]----+ | . +*E| | + . . =+| | o o .++| | . . o.o.| | S o ..| | . .. | | .o | | . .o| | o. | +-----------------+  Congratulations, your are now owner of a 4096 bit SSH-key! It is not necessary to assign a passphrase, so you can connect to the server without any password. But if anyone can get access to your private key he is also able to connect to any server that knows your public key! So it is very insecure and I recommend using a passphrase. For more options see man ssh-keygen. If you now take a look in your $HOME/.ssh/ directory you’ll find two keys, a public key named id_rsa.pub and a private key id_rsa. This private key is just for you, don’t share it with anyone!

To publish the public key, you can use the ssh-copy-id tool:

All that it does is appending the contents of your public key to the $HOME/.ssh/authorized_keys file of the user on the remote system (here remote is 192.168.0.111). If you don’t have the ssh-copy-id tool, you can do it manually but copying the contents of id_rsa.pub to the authorized_keys file of the remote user.. At the next login I don’t have to provide the password to the remote account, I only need the passphrase for the private key: If you didn’t supply a passphrase for the key you’ll never get asked for one. Last but not least we can disable the password authentication with the following settings in /etc/ssh/sshd_config : From now on, only people that have private keys, compatible to those public keys stored in $HOME/.ssh/authorized_keys on the server, can access the remote machine.