Alice's Usenet Flame

a parody, by John Cowan

Now it all started two full backups ago, on April 1st, when my
friend and I went up to visit the hackers at http://shack.hack.net.
But the hackers don't actually live on the World Wide Web server,
they just go there to post their favorite hacks that they develop
on their full 4.4BSDLite home boxes.

And since shack.hack.net has two one-gigabyte SCSI disks and no
regular sysadmin support, nobody had run `fsck' there for a long
time.

When we telnetted over there and saw the mess the cylinder maps
were in, we decided it'd be a friendly gesture to run `fsck' and
take the /lost+found files down to /dev/null.

So we took the five thousand files full of garbage, put them in
the back of a 64-bit VESA local bus, took rm's and kill's and other
implements of destruction, and headed on toward /dev/null.

Well, we got there and there was a mode of 0444 and a README file
next to /dev/null sayin', ``This Bit Bucket Under Development on
April 1st,'' and we'd never heard of a bit bucket being under
development on April 1st or any other day before, and with tears
in our eyes, we surfed into the sunset lookin' for another place
to put the garbage.

We didn't find one 'til we came to ftp://ftp.uu.net, and off the
side of ftp://ftp.uu.net was a sixteen gigabyte disk, and in the
middle of the disk was another heap of /lost+found files.  And we
decided that one big heap was better than two little heaps, and
rather than MGET their files, we decided to MPUT ours.  That's what
we did.

Logged off of homebox.hack.net, had a Thai dinner that couldn't be
beat, went to sleep(1), and didn't get up until the next clock
tick, when we got a talk request from obie@police.west-stockbridge.ma.us.
He said, ``Kid, we found your UID on a file at the bottom of five
hunnert megs of garbage and I just wanted to know if you had any
information about it.''

And I said, ``Yes sir, Officer Obie, I cannot tell a lie. I put
that file under that garbage.'' After speakin' to Obie for about
forty-five thousand more TCP packets, we finally arrived at the
truth of the matter and he said that we had to telnet in and `rm -rf'
the garbage, and also had to go down and speak to him at
police.west-stockbridge.ma.us. So we got in the 64-bit VESA local
bus with the rm's and kill's and implements of destruction and
headed on toward police.west-stockbridge.ma.us.

Now, friends, there was only one of two things that Obie could've
done at police.west-stockbridge.ma.us, and the first was that he
could've given us another 16M board for bein' so brave and honest
on comp.unix.wizards (which wasn't very likely, and we didn't expect
it), and the other thing was that he could've flamed us and told
us never to be seen running root programs in the vicinity again,
which is what we expected.

But when we got to police.west-stockbridge.ma.us, there was a third
arm of the conditional that we hadn't even counted upon, and we
was both immediately SIGTSTPed, and I said, ``Obie, I can't rm the
garbage with these here kernel waits activated.'' He said:  ``XOFF,
kid, and get in the back of the sendmail queue.'' ...And that's
what we did...sat in the back of the sendmail queue, and SMTP'ed
to the left-quote left-quote scene-of-the-crime right-quote
right-quote.

I wanna tell you 'bout the Internet, where this is happenin'. They
got one point two million hosts, no X.500 directory services, and
two or three competing IPng protocols, but when we got to the
left-quote left-quote scene-of-the-crime right-quote right-quote,
there was five IETF members with three protocol analyzers each,
bein' the biggest hack of the last ten years and everybody wanted
to get in the clari.news.flash story about it.

And they was usin' up all kinds of digital equipment that they had
hangin' around in the police.west-stockbridge.ma.us subdomain. They
was takin' backtraces, stack traces, GaAs VLSI integrated circuits,
HTML authoring tools, and RISC designs ...And they created seventeen
1000 x 1000 pixel 24-bit true color windows with hourglasses and
arrows and a scroll bar on the side of each one with a documentation
resource explainin' what each one was, to be used as evidence
against us.

...Took snapshots of the titles, the menus, the cursors, the pop up
notification windows, the upper right corner, the lower left corner
...and that's not to mention paging out the Bitmap Unders!

After the ordeal, we went back to police.west-stockbridge. Obie
said he was gonna isolate us behind a firewall. He said: ``Kid,
I'm gonna isolate you behind a firewall.  I want your RFCs and your
Lions Book.''

I said, ``Obie, I can understand your wantin' my protocol descriptions,
so I don't have any documentation about the firewall, but what do
you want my obsolete V6 kernel source for?'' and he said, ``Kid,
we don't want any unexpected panics.''  I said, ``Obie, did you
think I was gonna firestorm my local network for litterin'?''

Obie said he was makin' sure, and, friends, Obie was, 'cause he
took out the CTRL and ALT keys so I couldn't give a three-finger
salute and warm-boot, and he disconnected my 10baseT cable so I
couldn't speak the BOOTP protocol to a friendly host and reload
the OS image over the network. Obie was makin' sure.

It was about four or five hours later that RMS --- (remember RMS?
This here's not a song about RMS) --- RMS came by and, with a few
grumpy e-mails to Obie on the side, bailed us out of chroot(2),
and we went up to prep, had another Thai dinner that couldn't be
beat, and didn't get up until the next evening, when we all had to
go to news.admin.

We walked in, sat down, Obie came in with the seventeen 24-bit true
color windows with hourglasses and arrows and documentation resources,
sat down.

tale@uunet.uu.net came in, said, ``All rise!'' We all stood up,
and Obie stood up with the seventeen 24-bit true color windows with
hourglasses and arrows and documentation resources, and the moderator
walked in, with a '386SX clone with one extra slot running Windows
for Workgroups 3.11, and he sat down.  We sat down.

Obie looked at the bitty box... then at the seventeen 24-bit true
color windows with hourglasses and arrows and documentation
resources...  and looked at the bitty box... and then at the 24-bit
true color windows with hourglasses and arrows and documentation
resources, and began to cry.

Because Obie came to the realization that it was a typical case of
the Microsoft de facto monopoly, and there wasn't nothin' he could
do about it, and the moderator wasn't gonna look at the seventeen
24-bit true color windows with hourglasses and arrows and documentation
resources, explainin' what each one was, to be used as evidence
against us.

And we was fined fifty zorkmids and had to rebuild the complete C
news active file...by hand.


But that's not what I'm here to tell you about.  I'm here to talk
about the Net.

They got a server on the Milnet called simtel20.army.gov, where
you FTP in, you get your files inspected, detected, neglected and
rejected!

I went down and got my FTP session one day, and I walked in, sat
down (hung out on #hottub the night before, so I looked and felt
my best when I went in that morning, 'cause I wanted to look like
the LU 6.2-using Application from Armonk.  I wanted to feel like
... I wanted to be the LU 6.2-using Application from Armonk), and
I SYNed up, sat down, I was hung, wedged, broken, crashed, screwed,
and all kinds of mean, nasty, ugly things.

And I SYNed up, I logged in, the daemon gave me a 230 protocol
reply that said: ``Kid, see the C++ hackers at X3J16.''

I went up there, I said, ``Avatar, I wanna lose. I wanna lose!  I
wanna see hacks and kludges and abstract types and virtual functions
in my code!  Eat dead power supplies with cables between my teeth!
I mean lose! lose! lose!''

And I started jumpin' up and down, yellin' ``LOSE! LOSE! LOSE!''
and Stallman walked in and started jumpin' up and down with me,
and we was both jumpin' up and down, yellin', ``LOSE! LOSE! LOSE!
LOSE!!'' and some net.god came over, gave me an acm.org mail address,
sent me down the hall, said ``You're the new moderator of
comp.dcom.telecom.'' Didn't feel too good about it.

Proceeded down through gopherspace, gettin' more inspections,
rejections (this IS the Net), detections, neglections, and all
kinds of stuff that they was doin' to me there, and I was there
for five years... ten years... fifteen years... I was there for a
long time goin' through all kinds of mean, nasty, kludgy things,
and I was havin' a tough time there, and they was inspectin',
injectin', every single part of me, and they was leavin' no port
unbound!

Proceeded through, and I finally came to see the very last suit.
I walked in, sat down, after a whole big thing there. I walked up,
and he said, ``Kid, we only got one question: Have you ever been
SIGTSTPed?''

And I proceeded to tell him the story of the five hunnert megs of
garbage with full orchestration and sixteen-part harmony and stuff
like that, and other phenomenon.

He stopped me right there and said, ``Kid, have you ever been flamed
on news.admin?'' And I proceeded to tell him the story of the
seventeen 24-bit true color windows with hourglasses and arrows
and documentation resources.

He stopped me right there and said, ``Kid, I want you to go over
and sit down on that bench that says `Internet Society'... NOW,
KID!''

And I walked over to the bench there, and there's... The Internet
Society is where they put you if you may not be moral enough to
join PSI after creatin' your TCP implementation.

There was all kinds of mean, nasty, ugly-lookin' people on the
bench there ... there was microkernel hackers, Intercal hackers,
and PEM hackers!!  PEM hackers sittin' right there on the bench
next to me!  And the meanest, ugliest, nastiest one... the hairiest
PEM hacker of them all... was comin' over to me, and he was mean
and ugly and nasty and horrible and all kinds of things, and he
sat down next to me. He said:

``Originator-Key-Asymmetric:
MFkwCgYEVQgBAQICAgADSwAwSAJBALeWW4xDV4i7+b6+UyPn5RtObb1cJ7VkACDq
pKb9/DClgTKIm08lCfoilvi9Wl4SODbR1+1waHhiGmeZO8OdgLUCAwEAAQ==?''

I said, ``I didn't get nothin'. I had to rebuild the C news active
file.''

He said:

``MIC-Info: RSA-MD5,RSA,
FLASUPgMya8JR/d6RA0KR0aKdLctxDI7ykGbCBZBqaeEh2JfQwErpSmzMCzWsMbU
7SSnV1C2Vi4bfFuMxAB6qQ==?''

And I said, ``Littering...'' And they all moved away from me on
the bench there, with the hairy eyeball and all kinds of mean,
nasty things, till I said, ``And making gratuitous modifications
to Net-2 sources...'' And they all came back, shook my hand, and
we had a great time on the bench talkin' about microkernels, Spritely
file systems, IP version 6 routing, ... and all kinds of groovy things
that we was talkin' about on the bench, and everything was fine.

We was drinking Coke smoking all kinds of things, until the sysape
came over, had some paper in his hand, held it up and said:

``KIDS-THIS-LOG FILE'S-GOT-FORTY-SEVEN-EVENT-
CLASSES-THIRTY-SEVEN-SEVERITY-LEVELS-
FIFTY-EIGHT-MAGIC-WORDS-WE-WANT-TO-KNOW-THE-
DETAILS-OF-THE-HACK-THE-TIME-OF-THE-HACK-
AND-ANY-OTHER-KIND-OF-THING-YOU-GOT-TO-SAY-
PERTAINING-TO-AND-ABOUT-THE-HACK-ANY-
OTHER-KIND-OF-THING-YOU-GOT-TO-SAY-
WE-WANT-TO-KNOW-THE-OS-CD-ROM'S-VERSION-
NUMBER-AND-ANY-OTHER-KIND-OF-THING...''

And he talked for forty-five minutes and nobody understood a word
that he said. But we had fun rolling the mice around and clickin'
on the buttons.

I filled out the WWW form usin' the four-level macro defining
macros.  Typed it in there just like it was and everything was
fine.  And I put down my keyboard, and I switched buffers, and
there ...  in the other buffer...  centered in the other buffer...
away from everything else in the buffer... in parentheses, capital
letters, backquotated, in 43-point Splashface, read the following
words: ``Kid, have you X/OPENed yourself?''

I went over to the sysape.  Said, ``Mister, you got a lot of damn
gall to ask me if I've X/OPENed myself!  I mean, I mean, I mean
that you say, I'm sittin' here on the bench, I mean I'm sittin'
here on the ISOC bench, 'cause you want to know if I'm losing enough
to join aol.com, run Microsloth Windows apps, use SLIP, and insert
CR-LFs into text files, after bein' on lectroids?''

He looked at me and said, ``Kid, we don't like your kind!  We're
gonna send your subnet mask off to rs.internic.net!''  And, friends,
somewhere in Washington, enshrined on some 5.25 inch floppy disk,
is a study in ones and zeros of my brain-damaged programming style...

And the only reason I'm singin' you the song now is 'cause you may
know somebody in a similar situation. Or you may be in a similar
situation, and if you're in a situation like that, there's only
one thing you can do:

[ CHORUS ]

You know, if one person, just one person, does it, they may think
he's really dangerous and they won't flame him.

And if two people do it, in harmony, they may think they're both
Perl hackers and they won't flame either of them.

And if three people do it!  Can you imagine three people loggin'
in, singin' a bar of ``Alice's Usenet Flame'' and loggin' out? They
may think it's an re-implementation of sendmail!

And can you imagine fifty people a day? I said FIFTY people a day,
loggin' in, singin' a bar of ``Alice's Usenet Flame'' and loggin'
out? Friends, they may think it's a MOVEMENT, and that's what it
is: THE INTERNET GLOBAL ANTI-LOSSAGE MOVEMENT! And all you gotta
do to join is to sing it the next time it comes around on the
/var/spool/news/in.coming directory.

With feelin'.

You can hack anything you want
with shell scripts, Perl, and C.
You can hack anything you want
with shell scripts, Perl and C,
Walk right in and begin to hack
Just push your stuff right onto the stack
You can hack anything you want
with shell scripts, Perl, and C.

(but don't forget to fix the bug...with shell scripts, Perl, and C!)