--- Log opened Sun May 06 00:00:10 2018 00:01 < SporkWitch> no hardware acceleration sounds like it explains the poor performance 00:03 < Kryczek> mawk: good to know (about libmnl, RTMGRP_IPV4_IFADDR, etc) thanks! 00:07 < SporkWitch> i need to set up SPF and DKIM but i'm LAZY >_< 00:07 < mawk> here's the minimal boilerplate Kryczek : http://paste.suut.in/ONOiRPvr.cpp 00:08 < Kryczek> awesome :) thx 00:09 < Kryczek> SporkWitch: in DNS and/or in your mail servers? 00:09 < Kryczek> the former takes 5 minutes 00:09 < SporkWitch> the latter takes about 10; like i said, i'm LAZY lol 00:09 < SporkWitch> i've done it before, it's cake 00:09 < tds> remember DMARC as well :) 00:09 < SporkWitch> yup 00:10 < tds> and might as well enable DNSSEC while you're at it 00:10 < tds> (assuming you're with a decent tld and registrar) 00:10 < spaces> SporkWitch did you spank me already ? 00:10 < SporkWitch> the email stuff first; dnssec i've never actually looked into, so that would take more time 00:10 < SporkWitch> spaces: you haven't earned it 00:10 < Kryczek> speaking of which, got my first failfail DMARC notification the other day :D 00:10 < spaces> SporkWitch why not ? 00:10 < Kryczek> take that, spammers! 00:17 < Kryczek> tds: do you know if there is a way to get what email address the spammer was trying to impersonate? Google's DMARC report only says some IP in Taiwan was trying to impersonate my domain but not which user@ 00:18 < tds> Kryczek: is this with gmail/google apps email/whatever it's called now? 00:19 < tds> I'm not familiar with it personally, but if you take a look through the headers you should be able to find the details 00:20 < Kryczek> no no I meant I got a DMARC report from Google because the spammer was sending to Google 00:20 < Kryczek> could have been anybody else supporting DMARC 00:25 < tds> hmm, not sure - I guess if they're not included in the standard report you won't be able to get the details, unless you have access to additional google tools 00:27 < Kryczek> apparently I got only the aggregate report, not the forensic report... maybe I need to make the RUA and RUF addresses different 00:27 < SporkWitch> can't remember myself; been a while. i know there's tools to parse them 00:28 < Kryczek> ah: "Google does not support the DMARC ruf tag for the distribution of 00:28 < Kryczek> forensic reports." 00:28 < SporkWitch> how wude 00:29 < tds> hmm, so do google just not send forensic reports at all? 00:29 < Kryczek> indeed, according to https://support.google.com/a/answer/2466563?hl=en at least 00:37 < Project86__> I changed nameserver 1 in my resolv.conf the other day, idk what the second one was. But on reboot, it changed nameserver back to hitronhub. Am I not activating dns properly? 00:38 < mawk> I get those too Kryczek 00:38 < mawk> I wonder how these spammers got my domain name 00:38 < mawk> I'm not referenced on any polite search engine 00:39 < mawk> scanning the whole ipv4 space is easy, but the whole domain space isn't 00:40 < SporkWitch> the amusing one for me is the phone spam. Never had an issue in the past, never bothered paying the extra for the whois privacy, but the instant i register a .com i get 5+ spam calls/day lol 00:41 < SporkWitch> luckily google fi's block list is server side, so it's been decreasing as i add anything that doesn't leave a legitimate voicemail to the blocklist lol 00:56 < Peng> mawk: Domains mostly aren't secret. You can usually download or buy domain lists or zone files for many TLDs. 00:56 * spaces bitchslaps SporkWitch with a salmon 00:57 < SporkWitch> spaces: fuck off 00:57 < spaces> SporkWitch relax man 00:57 < SporkWitch> Peng: whois listings are public, though most registrars offer "whois privacy" however that works; i just don't bother 00:57 < SporkWitch> spaces: don't ping me for no reason, man 00:58 < spaces> SporkWitch it was a reason ;) a very good one as well 00:58 < SporkWitch> sit on a cactus and spin 00:59 < spaces> SporkWitch I don't have a cactus 00:59 < SporkWitch> fuck off 00:59 < spaces> SporkWitch temper you language please 00:59 < SporkWitch> fuck off 00:59 < spaces> SporkWitch temper you language please 01:00 < SporkWitch> catphish: mind getting rid of this piece of shit? 01:00 < spaces> SporkWitch deal with it yourself and use /ignore instead to try to become friends with the ops 01:00 < SporkWitch> or you could fuck right off you kiddie diddling piece of shit 01:01 < spaces> catphish ^ you might like such behaviour :) 01:02 < Disconsented> SporkWitch> Stop throwing a tantrum on IRC please 01:03 < SporkWitch> you can fuck right off too 01:13 * spaces hugs Disconsented 01:14 < spaces> Disconsented after the hugs the spanking starts to :P 01:14 < spaces> tho 01:40 < Apachez> what if want to fuck left on? 01:54 * dogbert2 just ordered this: https://www.synology.com/en-us/products/DS218+ 01:56 < Apachez> dogbert2: now what did we tell you last time you were drunk and ordered stuff online? 01:57 * dogbert2 doesn't get drunk 02:05 < Epic|> Why such a tiny little girl nas 02:06 < Rusty78> Environment: Ubuntu 17.10x64 VM on Vultr. 02:06 < Rusty78> Problem: For the life of me I can not get my VPS to use a HTTP proxy to connect to the outside internet. 02:06 < Rusty78> Question: Any idea why I cannot get this to work? And any ideas on how I can make it work or another VPS provider I could use that would allow it to work? 02:08 < Rusty78> Context: I know how to use/setup HTTP proxies on Ubuntu. I have done it many times on my local machine. However, none of my attempts with VPS services have allowed me to connect to the outside internet using them. 02:13 < dogbert2> for home use, I don't need somethng large 02:24 < tds> Rusty78: what proxy are you attempting to connect via? 02:24 < tds> I'd be surprised if vultr were actually blocking tcp connections out to certain other services 02:25 < Rusty78> tds: I've tried DA, vultr, and EC2 and none of them are allowing me to connect 02:26 < Rusty78> I am using this curl command to test the proxy: curl -x http://146.185.200.89:8080 --proxy-user *Username*:*Password* -L https://google.com 02:26 < Rusty78> It works on my local machines but fails on all of my VPS instances 02:28 < tds> who operates that proxy? is it possible it's firewalled to only allow connections from a certain ISP? 02:29 < Rusty78> I bought a list from this service: https://buy.fineproxy.org/eng/ 02:29 < Rusty78> Looking through their FAQ to see if they block any connections, I don't believe they do 02:32 < Rusty78> tds: Oh I just saw a setting that locked my IP to authorization, looking at it now. Thank you so much for the suggestion!! 02:34 < tds> Rusty78: either way, I'd probably advise against proxying your traffic via random services you've found on the internet 02:34 < tds> if you want to do something like that, I'd just do it on a VPS from a company you trust 02:35 < Rusty78> tds: It's for security-testing my software from crackers/spammers. The information is randomized and not trusted 02:43 < Project86__> When people talk about changing dns to hide activity from isp, is it just a single .conf to change, or do you need to make your machine an actual dns server? 02:45 < Project86__> Idk if u just change the resolver, or if it takes a lot more than that 02:46 < Project86__> Could use a helpful pointer 02:53 < SporkWitch> Project86__: all it "hides" is the lookup from their DNS server logs; you need to take extra measures if you're trying to hide the DNS lookup itself, and that's pretty much moot too, since you eventually need to send to those IPs. It's not a particularly useful endeavor, IMO. The better reason is that ISPs tend to do sketchy stuff with their lookup failure pages 02:53 < SporkWitch> Sometimes they also deliberately omit entries (e.g. piratebay) 02:54 < SporkWitch> if AOL were still an ISP i could get really creative with all the nastiness they could pull, even without forcing you to use their terrible client 02:54 < SporkWitch> s/could pull/would pull/ 03:04 < UnsaneVirusez> No one is talking 03:06 < MarkusDB1> I've gotten my hands on a zyxel gs1900 smart managed switch, going to use for the gigabit part of a home lan. Is that a good switch? 03:25 < Project86__> SporkWitch: so if I were to change my dns resolver, it would hide my "piratebay" search from my isp? 03:26 < Project86__> And what extra steps to hide the dna lookup itself? 03:26 < cr1t1cal> what is the point of having mail access protocols like POP3 when a mail client on a user's computer can just invoke the mail server and retrive inbox contents whenver the client starts up 03:27 < Project86__> I saw a tut on creating your own dns server, and thought that meant I could bypass the subservers straight to one of the 12 main ones, cutting out middleman, increasing speed, and hiding what I do 03:29 < Project86__> Another thought on the topic, I've heard you can do dns resolution WITHIN your VPN. What's the point of this? 03:30 < Project86__> Isp sees your search, sends to VPN so others can't see, then make it look like it didn't come from VPN? 03:31 < Project86__> Or is it just to boost speeds? 03:32 < SporkWitch> cr1t1cal: what do you mean? 03:40 < SporkWitch> sorry, had to reboot, didn't see your response if you did response to my query 05:04 < patientplatypus> https://stackoverflow.com/questions/50195896/how-do-i-get-one-pod-to-network-to-another-pod-in-kubernetes-simple 05:09 < Project86__> SporkWitch: did u get my response? 05:11 < SporkWitch> Project86__: i did not; had to reboot and the playback on my bouncer is borked lol 05:11 < Project86__> It was a lot lol. 05:12 < Project86__> 8:25:05 PM SporkWitch: so if I were to change my dns resolver, it would hide my "piratebay" search from my isp?8:27:45 PM I saw a tut on creating your own dns server, and thought that meant I could bypass the subservers straight to one of the 12 main ones, cutting out middleman, increasing speed, and hiding what I do8:29:35 PM Another thought on the topic, I've heard you 05:12 < Project86__> can do dns resolution WITHIN your VPN. What's the point of this?8:30:51 PM Isp sees your search, sends to VPN so others can't see, then make it look like it didn't come from VPN? 05:23 < SporkWitch> if you're not using a VPN, the privacy issue isn't really a factor, they can still see it all 05:23 < SporkWitch> as to DNS within VPN, the query is sent over the VPN so origin appears to be the VPN server 06:05 < spaces> SporkWitch that depends on the VPN setup 06:05 < vrederv> Hey folks I was wondering if the DHCP option 1 (subnet mask) is compulsory. I think it has to be because how else do clients figure out their subnet mask. 06:05 < SporkWitch> spaces: standard configuration is for everything to go over VPN; split tunnels are generally discouraged and are not applicable to the case in question, as it would defeat the point 06:06 < spaces> SporkWitch you are wrong again, check openVPN it's not ;) 06:06 < spaces> all traffic is default also done over local and not VPN 06:06 < spaces> you need to add the route 06:07 < spaces> you need to add the dns servers, all of it 06:07 < spaces> but I'm off, latwer 06:07 < SporkWitch> you misconfigured your openvpn; that's not my problem. and while you're busy pushing incorrect information, use your punctuation instead of spamming 06:08 < spaces> SporkWitch I didn't misconfigurate anything, how can you know ? it's a common question why VPN's don't work... because it's default not set. So you default statement is pretty wrong 06:08 < SporkWitch> i didn't say default configuration, i said standard configuration. you misconfigured your openvpn 06:09 < spaces> SporkWitch it seems you are the knowall here, I see you for the first time in years, so hold back please ;) 06:09 < SporkWitch> spaces: i don't even remember you, which is surprising, i'd expec to remember someone as incompetent as you, but since you've been absent (apparently for years?) i guess it's not too surprising 06:10 < spaces> SporkWitch again, I did not configurate anything at all, can you please stop insulting people like that ? you are wrong my dear mate. You are stating sh*t without any knowledge 06:10 < spaces> stop that, more people seem to have complained earlier. 06:10 < spaces> SporkWitch some people don't have to work ;) 06:10 < SporkWitch> spaces: one should never be insulted by the truth, and the fact that you're reporting non-standard behaviour means you either misconfigured it or deliberately set it up in a non-standard way 06:11 < SporkWitch> regardless, as usual, you're wrong, now fuck off 06:11 < Disconsented> Who shat in your corn flakes? 06:11 < SporkWitch> braindead fuckwits like the above 06:11 < spaces> SporkWitch but again, good luck with it, I will ignore you as you are using too much bandwidth which could be better used for betetr people later! 06:11 < precise> Disconsented: ...me? 06:11 < precise> I thought no one was eating them 06:11 < precise> .. 06:11 < precise> sry 06:12 < spaces> precise some people take everything they can get 06:12 < precise> :/ 06:12 < precise> I take all the shits I can get 06:13 < spaces> precise pass them so SporkWitch he seems to like making more out of it :P 06:13 < SporkWitch> fuck off 06:13 < spaces> ok I'm away for a nap 06:13 < skyroveRR> hah 06:13 < skyroveRR> Hi spaces 06:13 < skyroveRR> * SporkWitch 06:14 < SporkWitch> skyroveRR: don't encourage it 06:14 < Disconsented> catphish, danieldg, pppingme, StevenR or xand I see none of you are marked as away, can you please deal with ^ 06:14 < precise> heh 06:14 < Disconsented> huh 06:14 < Disconsented> thats neat 06:14 < Disconsented> sigyn points out mass nick mentions 06:14 < SporkWitch> considering the number of bots that mention spam, are you surprised? 06:14 < spaces> Disconsented I just /ignored him, it's great! 06:15 < Disconsented> I thought it was still running off flooding rather than mass nicks 06:16 < SporkWitch> it's probably a combination; mass mention gets a warning, repeat mass mention triggers the kline earlier. would make sense to differentiate between a dumbass that pasted here instead of pastebin vs blatantly obvious and intentionally disruptive spam 06:16 < kline> SporkWitch, channel ops can choose to do that 06:17 < SporkWitch> kline: i'd apologize for the mention, but you kind of bring it on yourself lol 06:17 < kline> no need to apologise 06:17 < kline> i can mute irc whenever i want 06:17 < SporkWitch> kline: basic etiquette, don't mention people for no reason :) 06:17 < kline> staff dont count 06:18 < SporkWitch> kline: i'm inclined to disagree, it just means the potential reasons are larger in number 06:18 < precise> People mention me all the time 06:18 < SporkWitch> precise: that's because it's september, unfortunately >_< 06:18 < Disconsented> I wonder why 06:18 < precise> I really need to adjust my highlight criteria 06:18 < precise> I'm too lazy 06:18 < precise> even precisely gets me a ping 06:18 < precise> lol 06:19 < Disconsented> I've had to filter out mentions that are not at the start of a message due to the bots 06:19 < Disconsented> Which seem to have given up recently 06:19 < Disconsented> Either that or I've ignored all of their messages 06:19 < SporkWitch> youch; mine ignores my name unless followed by nothing, a space, colon, comma, or period. 06:19 < precise> or kline has been busy ;) 06:19 < SporkWitch> huzzah for sane defaults 06:20 < kline> Disconsented, its exam season, all the school students who run up botnets on mommys card are busy just now 06:20 < kline> give it a few weeks 06:20 < precise> kline: that sucks :/ 06:21 < Disconsented> precisely 06:21 < precise> heh 06:22 < precise> I suggest when we find sources of botnets, we send them to gulag 06:22 < Disconsented> The bitcoin mines? 06:22 < precise> Yes 06:22 < precise> But dont let them mine bitcoin 06:22 < precise> ...Make them mine dogecoin 06:23 < precise> Everytime you mine it barks memes at u 06:25 < SporkWitch> make them do it with pen (not pencil), paper, and an abacus (sp?) 06:30 < Project86__> SporkWitch: so then there's not much of a way to hide what your isp sees? 06:31 < SporkWitch> Project86__: they're the gateway, unless you tunnel everything over a VPN, they're going to see the traffic, and even then they'll know the IP of your VPN endpoint 06:32 < Project86__> That's why I was asking if I configured my machine to act as router, and be setup as a dns server, I could get around the isp altogether, no? 06:33 < SporkWitch> Project86__: think that through; where's that DNS server getting its records from? 06:33 < Project86__> True 06:33 < precise> SporkWitch: Point it to a non-ISP DNS server w/ DNSSEC? 06:34 < Project86__> Unless VPN. Then the dns is getting it from there correct? 06:34 < precise> If setup that way 06:34 < SporkWitch> precise: i've not gotten around to researching DNSSEC yet, i'm not clear on what it offers or how it works 06:34 < precise> I've seen a few that just routed the DNS through the VPN, back to the ISP DNS servers 06:34 < precise> Project86__: ^ 06:34 < SporkWitch> that's hilarious lol 06:34 < precise> Yeah 06:34 < Project86__> precise: nicee 06:34 < precise> The DNS client just reuses some of the DHCP lease options 06:35 < precise> s/DNS/VPN 06:35 < precise> am tired 06:35 < SporkWitch> stuff like that always makes me think of this: http://trollscience.com/image/f/full/8c6ac6fe0aa5ec1952e8e274f6df0f5e.jpg 06:35 < skyroveRR> hehe 06:35 < precise> lol 06:35 < skyroveRR> SporkWitch: lol 06:35 < Project86__> Any tuts or links u could point me to precise ? 06:36 < precise> Project86__: To set up a VPN? 06:36 < Project86__> The way you described 06:36 < precise> One sec 06:36 < precise> Project86__: Where is Cloudflare on your reputation scale? 06:38 < Project86__> Wait, what? Idk who sent that and what it means. Or how u.did it lol 06:38 < precise> Project86__: ? 06:39 < Project86__> I gotta a little grey message thingy from someone https://usercontent.irccloud-cdn.com/file/HoSRpnNs/Screenshot_20180505-233907.png 06:40 < Project86__> Nvm lmao 06:40 < precise> Project86__: ok..? 06:40 < Project86__> precise: never used cloudfare, why? 06:41 < Project86__> (And I meant nvm to my stupidity, not to your questions and help) 06:42 < precise> Project86__: ok lol 06:43 < precise> Project86__: I cant find any straight away tutorials, but the gist is you are simply shifting trust. Do you trust a random DNS server w/ some security features more than your ISP? 06:43 < precise> Same goes to VPNS. 06:44 < precise> VPN will be most simple, as long as you can verify that your DNS traffic is being tunneled through the VPN, to the server of your choice. 06:45 < precise> Easiest, best case scenario is a paid VPN service with some privacy, then another provider for DNS with DNSSEC, DNS over TLS, etc. 06:45 < SporkWitch> Project86__: what do you mean? are you talking about the join message? lol 06:45 < SporkWitch> (grey message thingy) 06:45 < precise> Best of the best case scenario is rolling your own multinode VPN network and DNS servers 06:47 < Project86__> I prefer free for now lol. No matter how frustrating. But was hoping I could have it all, hide from isp, as well as reached sites via vpn 06:48 < Project86__> SporkWitch: now, the time thingy changed, so his 2nd message to me popped under "new messages", I thought it was like a whisper chat lol 06:48 < precise> Project86__: free VPN is logged 06:48 < precise> Always. 06:49 < SporkWitch> ah lol 06:49 < precise> If you want free, role your own, but even then, that's like $5/month 06:49 < Project86__> OpenVPN is logged by YOU 06:49 < precise> OpenVPN is just a protocol and client 06:49 < precise> You still need to run the VPN server somewhere 06:50 < precise> Project86__: If you want free but as much privacy as possible on $0, find a 3rd party DNS server that offers DNSSEC or DNs over TLS. 06:51 < SporkWitch> before we go much further down this rabbit hole, i'm compelled to point out: no one gives a shit about you, Project86__. You are not the target of a global government conspiracy. 06:51 < precise> SporkWitch: No, but he's not afraid of the government. 06:51 < precise> SporkWitch: He stated he wants to hide his shit from his ISP. 06:51 < precise> I don't blame him. 06:51 < precise> Why pay twice for internet? 06:51 < SporkWitch> fair, i just feel compelled to point it out when we start going down this path 06:52 < precise> SporkWitch: Yeah, I get it. 06:52 < precise> I hear that alot SporkWitch ;) 06:52 < SporkWitch> SOOOOO many nuts these days 06:52 < precise> Eh 06:52 < skyroveRR> lol 06:52 < precise> People are crazy, but you cant just turn your head and cover your ears... 06:52 < skyroveRR> On IRC, you can. With /ignore. 06:52 < precise> I mean you can... 06:52 < precise> But you shouldn't 06:52 < precise> skyroveRR: lol 06:54 < SporkWitch> precise: i seem to run into the real crazy ones; had one in ##security earlier talking about how you should physically go to a store to buy hardware so "they" (presumably the illuminati) don't intercept the web order and send compromised hardware. As if even a government is going to do something so easily detected, difficult to pull off, and cost-prohibitive. It's literally easier to compromise 06:54 < SporkWitch> the factory and cover all the devices 06:55 < skyroveRR> SporkWitch: you realise that's too far fetched and rare? 06:55 < SporkWitch> "threat modeling" seems to be a VERY foreign concept to the current generation 06:55 < precise> SporkWitch: It's happened on a few occassions and has been linked to the NSA via leaks, but your right. Unless you are a major target, (list of <100) that would never happen. 06:55 < spaces> why the hack is IT so attractive ? I cannot sleep because of all the ideas I have again 06:56 < Project86__> I guess I'm just confused or not saying things the right way. Intended to have my own OpenVPN server running (connected somewhere) and also find a way to utilize the dns stuff, so isp of connected server, has no idea what's going out, or coming in 06:56 < SporkWitch> precise: i'm skeptical of even that; far more likely that at least a large batch were compromised. Too easy to detect something like that by simply comparing a couple of the same model, unless we're looking at dopant-level attacks, in which case we're DEFINITELY looking at a compromised fab, so why do just one device? 06:57 < precise> SporkWitch: It was intercepted at a shipping center IIRC. 06:57 < SporkWitch> precise: that kind of goes to the "too hard to pull off and too easy to detect" parts of my comment lol 06:57 < precise> SporkWitch: If they are a high profile target... 06:57 < precise> I mean... 06:57 < precise> They deal with budgets that don't even exist... 06:58 < precise> Domestic surveilance and all 06:58 < precise> I don't want to sound cray 06:58 < SporkWitch> the problem with that hypothesis is that there are far easier ways to get their info 06:58 < precise> SporkWitch: It's not get their info 06:58 < precise> It's their communications 06:58 < Project86__> I've seen some crazy one in ##security too. L ile the guy with the heroin junkie uncle that had 60mil of bitcoin for 5 a piece lol 06:59 < precise> If they use E2E encryption 24/7, then a local keylogger or malware would be needed. 06:59 < SporkWitch> precise: even that, though then we get into the fact that if your adversary is a government and you aren't a government there's really not a whole lot you can do 06:59 < precise> Project86__: So if you run your own VPN server, you need to run it somewhere outside your network. On a VPS or something. 06:59 < precise> You cant just run a OpenVPN on your server and be protected. 06:59 < precise> A VPN is a tunnel, a tunnel needs 2 ends. 07:00 < SporkWitch> and you need to make sure your ISP isn't also the VPS provider's ISP 07:00 < precise> SporkWitch: You make a good point :/ 07:00 < precise> SporkWitch: ++ 07:00 < precise> And that they don't share data via 3rd partys 07:01 < spaces> Project86__ see it as a remote GW 07:01 < SporkWitch> (not feasible to make sure your ISP isn't in the path between your VPS and the DNS server) 07:01 < precise> Use 4th(?) party DNS server 07:02 < precise> So Me -> VPNn + DNSw/DNSSEC -> VPN Server -> DNSSEC requests 07:02 < SporkWitch> actually, that's silly of me, just use the VPS provider's DNS; any queries it relays would be anonymized by all the other traffic coming out of their network 07:02 < precise> Run a stub on the VPN server? 07:02 < precise> SporkWitch: Nope 07:02 < spaces> precise last time I was on a party I never saw any DNS only POV :P 07:02 < precise> SporkWitch: The DNS request has to know where to send the results. 07:02 < precise> They can match the request to the requestee with the responses destination IP 07:02 < superkuh> Yeah... you never think you're a target then one day the FBI comes knocking hard and breaks in at 6am. 07:03 < precise> heh 07:03 < superkuh> Happened to me in 2010. 07:03 < superkuh> No charges ever. They just stole all my computers, my flatemate's computers, all my media, and left. Never to be heard from again. 07:03 < precise> SporkWitch: That logic would apply to a decentralised DNS network 07:03 < SporkWitch> precise: and? VPN to VPS, DNS sent over the VPN, VPN host relays request to VPS provider's DNS, DNS provider's DNS either replies directly or does a lookup for you 07:03 < spaces> superkuh 6am damn! you can get even a decent sleept in such cases! I would so it @ 4am :D 07:03 < spaces> do 07:03 < SporkWitch> precise: one of us is missing something, but i'm pretty sure it's you, lol 07:03 < Project86__> precise: yes, I am aware of that much, and know I'll eventually need to buy hosting. The tunnel (client) is a portable device I carry. I want communications to remain discreet between the 2 07:04 < precise> SporkWitch: So, in this scenario, is my above flowchart accurate? 07:04 < superkuh> Not that doing silly things like only buying hardware in person would've helped. 07:05 < SporkWitch> superkuh: if you're doing something naughty then that would factor into your threat model. The assumption unless otherwise specified is that piratebay is the extent of your naughtiness 07:05 < spaces> Project86__ get multiple VM's and let your VPN server send it's DNS requests to your other VM's over tunnel. Use seperate VPS companies for them all 07:05 < superkuh> I wasn't. 07:05 < superkuh> Thus the no charges thing. 07:05 < precise> spaces: Then route everything through Tor 07:05 < precise> ;) 07:05 < SporkWitch> superkuh: that's something else entirely then :P 07:05 < spaces> precise good idea! 07:05 < SporkWitch> precise: i didn't see a flowchart 07:05 < superkuh> It was just the style at the time. Occupy, Wikileaks, all that jazz really got 'em riled up. 07:06 < spaces> damn is it that difficult to watch pr0n these days ? 07:06 < precise> So Me -> VPNn + DNSw/DNSSEC -> VPN Server -> DNSSEC requests 07:06 < precise> SporkWitch: ^ 07:06 < spaces> I thought beeg.com was just a simple idea 07:06 < precise> shittyflowchart(t) 07:06 < superkuh> I use multiple VPS but I only set up per-application/use socks tunnels (shadowsocks). 07:06 < precise> SporkWitch: You said use the VPS provided DNS server 07:07 < superkuh> And then use 'em as seedboxes too. 07:07 < precise> You run this VPS? 07:07 < precise> SporkWitch: ^ 07:08 < SporkWitch> precise: localhost → VPN → VPN provider's DNS. Any queries the VPN provider's DNS doesn't have cached would be looked up and lost in all the other requests, nothing tying it to your VPN server. No point hiding the lookup of the VPN server's address, your ISP is seeing that IP no matter what you do 07:08 < SporkWitch> precise: that is, nothing outside the VPS provider's DNS logs tying you to it, but then we're back in the original boat, since they see all your traffic anyway 07:08 < precise> SporkWitch: Your lookup request to the VPN provider still needs to contain the needed domain 07:09 < SporkWitch> precise: and? 07:09 < precise> SporkWitch: I see what you mean, it's another layer of privacy. 07:09 < precise> This is a VPN service 07:09 < precise> Not a DIY VPS based VPN? 07:10 < precise> *In this scenario 07:10 < SporkWitch> applies to both, assuming the VPN provider offers DNS, but we were talking about openvpn + VPS 07:10 < precise> There is no VPN provider if you role your own 07:10 < precise> You are the provider 07:11 < SporkWitch> as an aside, the strongswan plugin for networkmanager is rubbish, it doesn't allow PSK + username + passphrase for ipsec >_< 07:11 < precise> Ok 07:11 < precise> I like mullvad 07:11 < precise> pls no bant 07:11 < precise> am not shill 07:11 < SporkWitch> precise: like i said, it applies to both a VPN service and hosting on a VPS, assuming the VPN provider offers DNS. The VPS provider definitely offers DNS. 07:12 < precise> SporkWitch: My scenario was a role your own scenario originally. So you wouldn't want to use your VPS providers DNS servers as those are certainly logged. But VPS' are inherently compromised because you don't even have access to the hardware in most cases. 07:12 < precise> So we are kinda debating over which hole is gonna sink the ship 07:12 < Project86__> Actually thought about using the vms, client being on android in linux deploy. But going thru tor hops is too slow for my intended needs 07:12 < SporkWitch> *roll (sorry, was bugging me) 07:12 < precise> lol 07:12 < precise> tnx 07:13 < precise> Wait 07:13 < precise> now 07:13 < precise> Role is a verb, to role 07:13 < precise> Roll is a food, a bread 07:13 < precise> Now neither of those look like words 07:13 < precise> fuck 07:13 < Project86__> Roll is also a verb, roll dice 07:13 < Project86__> Dundundunnn 07:13 < SporkWitch> precise: don't spam. roll is a verb and a noun, role is a noun. 07:14 < SporkWitch> precise: sure, maybe the VPS provider's DNS is logged, but it doesn't matter: they see all your traffic anyway 07:14 < SporkWitch> precise: so okay, you hid the domain name lookup; they still have the IP and can do a reverse lookup 07:14 < precise> Like I said, debating which hole will sink the ship ;) 07:15 < precise> VPSes are inherently insecure. 07:15 < Project86__> This is alot to take in haha 07:15 < precise> heh 07:15 < precise> Project86__: You don't need to do all this. 07:15 < precise> If your threat model is your ISP only, just get a cheap VPN provider. You mentioned a mobile device though? 07:15 < Project86__> I know, I'm just observing and weighing pros and cons of methods 07:16 < Project86__> Ok, so here's the setup... server to client (pi0, or android) and then connecting to client via devices 07:16 < superkuh> I go through my VPS because my ISP attacks and injects malicious code into anything it can. 07:17 < SporkWitch> Project86__: sorry, we're talking at a whole other level than you're working at. For your needs a VPN service or one you host yourself is sufficient, though i still think it's a waste of effort. Unless they're really evil and going out of their way (most aren't, it's more trouble than it's worth) simply using another DNS provider is sufficient. So they get some tracking data from the IPs you 07:17 < precise> superkuh: :/ 07:17 < SporkWitch> visit; who cares? 07:17 < precise> SporkWitch: I care :/ 07:17 < SporkWitch> it's just not worth it lol 07:17 < precise> It's easy to set up 07:18 < SporkWitch> it has cost and performance implications for such a marginal privacy gain. 07:18 < precise> Just get a VPN service, route DNS through VPN service. $5 a month, shift trust to another party. I don't like most major ISPs, so taking away a billionth of a percent of their profit margin is enough for me. 07:19 < SporkWitch> i do need to look into DNSSEC though 07:19 < precise> SporkWitch: Increased latency by what? 15-30ms? If you game or something its an issue, but for almost everything else its not. 07:19 < SporkWitch> precise: a non-trivial percentage of geeks game :) 07:19 < precise> Unless you are running some <3Mbps bandwidth, the overhead is negligable. 07:19 < SporkWitch> precise: you're also introducing a second point of failure 07:19 < precise> SporkWitch: Most decent VPN providers have clients which offer autofailover 07:19 < precise> Or for the more paranoid, killswitch. 07:20 < precise> They also have dozens of servers in various locations if you get the right one. 07:21 < Project86__> And my router/server will also be portable, so when connected to random APs I don't want them knowing there's a vpn tunnel routing on their network 07:21 < precise> Project86__: You can get VPN clients for Android and iOS to pair with most reputable VPN services. 07:21 < SporkWitch> point stands even with that; if you're that paranoid then failover is not an option 07:21 < SporkWitch> android also supports ipsec natively 07:21 < precise> SporkWitch: Yup, but in this case, I don't think Project86__ is. 07:21 < precise> SporkWitch: ++ 07:22 < SporkWitch> (it's actually really annoying: android supports the ipsec implementation in the stock asus ac-3100 firmware, but i can't get it working in networkmanager lol) 07:23 < precise> Also, to the gaming point. It may not be in Project86__'s reach or desire to do, but if you can identify what ports said games use, you can route those ports at the gateway to your regular WAN link. 07:23 < Project86__> I'm not paranoid, just like to be a step or two ahead. 07:23 < precise> Project86__: I know :) 07:23 < precise> I'm the paranoid one here. 07:23 < precise> ;) 07:24 < Project86__> Lol 07:24 < precise> The above point is assuming uncommon ports, or possibly route by destination. 07:24 < precise> Which would make more sense... 07:25 < precise> Ok, it's 1:30AM localtime, Imma sleep. SporkWitch Thanks for the lively conversation. Project86__ Best of luck :) superkuh Get yourself a lawyer ;) 07:25 < superkuh> 'night. It was 2010. 07:25 < Project86__> precise: thanks for the gaming tips fam ;) 07:26 < precise> np 07:30 < Project86__> Now time for a blunt, and to dig back in this project. Ttyl guys 07:34 < SporkWitch> precise: have a good one, mate 07:41 < Curiontice> What is the alternative for OSPF's ECMP load banalcing? 07:48 < Project86__> SporkWitch: something just popped in my head. Like precise was saying earlier, you cant just run VPN server on machine and be connected without a client to tunnel to.....BUT... what if you configured a WiFi dongle as it's own AP (and VPN client), if later is possible. In this hypothetical, could server and client safely be the same machine? 07:48 < Project86__> Or server on local, and vm as client AP? (That one sounds like it makes more sense) 07:48 < Project86__> SporkWitch: something just popped in my head. Like precise was saying earlier, you cant just run VPN server on machine and be connected without a client to tunnel to.....BUT... what if you configured a WiFi dongle as it's own AP (and VPN client), if later is possible. In this hypothetical, could server and client safely be the same machine? 07:49 < SporkWitch> Project86__: you have it backwards; the client needs a server to connect to. As to the rest, think it through: how is the traffic leaving the LAN? 07:50 < linux_probe> sounds like they made a new loopback lol 07:50 < linux_probe> or a very complex loopback 07:51 < linux_probe> lmao, nothing like 127.0.0.1 / localhost 07:51 < Project86__> Oops, I wrote it backwards, but I knew what i meant lol. And shit... You're right. Scratch that theory 07:51 < Project86__> Haha 07:52 < linux_probe> IRL you could do vpn server on a VM host machine and vpn client on the guest 07:52 < SporkWitch> doing so would be pointless, mind you lol 07:52 < linux_probe> mostly yes 07:52 < Project86__> Lol 07:53 < linux_probe> or from one guest to a second 07:53 < Project86__> Ok ok, let's not bash the n00b too hard lol 07:54 < SporkWitch> no one's bashed you; you've asked reasonably good questions, shown initiative, and though it occasionally takes a little prodding, exercised critical thought. Trust me, we could use more like you lol 07:54 < Project86__> SporkWitch: thank you, I'm trying my best to learn from scratch 07:54 < SporkWitch> everyone has to start somewhere 08:04 < Project86__> I'm already learning. I was about to ask if making the vm the OpenVPN setup as a cloud service on wlanX, and using a proxy to change "who you are" on wlanY as client, if that would do the trick. Thought aboutnit, same problem..same LAN lol 08:05 < SporkWitch> Project86__: yup; no matter what you need to use a VPN to securely send the traffic somewhere your ISP can't monitor it; they'll see the VPN traffic, but not the content you send over it 08:05 < SporkWitch> Project86__: all they see is encrypted payloads in UDP packets to the VPN server's IP 08:07 < Project86__> Cool. That's good enough for me for now. That second part was part of what I wanted to circumvent, the isp knowing my VPN ip 08:08 < SporkWitch> there's no way around that 08:09 < Project86__> Was hoping to hide that too. Heard that's what dns was for 08:09 < SporkWitch> the traffic still has to go through them 08:09 < SporkWitch> no, DNS turns a domain name into an IP; you cannot communicate on the internet without a source and destination IP, so no matter what they will know, at a minimum, the IP of the VPN server 08:10 < Project86__> Can I obsucate it? Make it look like a different VPN ip? Or something else entirely? 08:10 < Project86__> I read what dns does, but people say changing it to like 9.9.9.9 or 1.1.1.1 makes it go faster and hides ur from isp? 08:12 < m1KeY_> https://dns.watch 08:12 < Lucretius> hey, not sure if this is the right channel to ask this 08:13 <+pppingme> Project86__ faster may or may not be true, hides you from isp is absolutely not true 08:13 < Lucretius> i returned to my home after a few months i found an open public wifi, do they know which site i browse or videos i watch on youtube or similar? 08:13 <+pppingme> why are you worried about hiding from your isp? 08:13 < Lucretius> since isnt mine i want to use it but im worried 08:13 < Lucretius> i now by seeing the router they see that im connected 08:13 < SporkWitch> Project86__: if you did that with a letter, what would happen? 08:13 < Lucretius> *know sorry 08:13 < linux_probe> lol 08:14 * linux_probe checks to see if Lucretius is my neighbor 08:14 < SporkWitch> Lucretius: you're on their network, they can see whatever you send over it 08:14 < Project86__> m1KeY_: thanks for link 08:14 < Lucretius> also sites and whatever? 08:14 < Project86__> SporkWitch: very good point 08:14 < Lucretius> i dont think so that one 08:14 < Lucretius> only the bandiwdth used if not mistaken 08:14 < at0m> Lucretius: SSL sites (https://) will only show the website you're on, and the amount of data your pulling in 08:15 < Lucretius> ok 08:15 < Project86__> SporkWitch: I'd send it from someone else's address, or just write a fake name with no return adress 08:15 < linux_probe> mine must think I like guns, women, booze, mainly 08:15 < SporkWitch> Project86__: and then how does it get back to you? 08:15 < Lucretius> the line is ok i tesed it 10mb down and 9 ms ping 08:15 < Lucretius> tested* 08:16 < Project86__> Ahh 08:16 < SporkWitch> [02:14:23] Lucretius: you're on their network, they can see whatever you send over it 08:16 < linux_probe> then mix in all the various youtube, plumbing, electrical, hvacr 08:16 < Project86__> Then use someone else's address that will tell me when I get a letter in the mail to get 08:17 < Lucretius> ok thanks for the heads up 08:17 < SporkWitch> Project86__: perfect. That person is the VPN host 08:18 < Lucretius> i see is a public network, they left it open as intended not by mistake tough 08:18 < Lucretius> i should be fine if i not abuse it 08:18 < SporkWitch> [02:14:23] Lucretius: you're on their network, they can see whatever you send over it 08:18 < Project86__> SporkWitch: I like your examples lol 08:18 < Lucretius> just light streaming and browsing for pass time 08:19 < SporkWitch> Lucretius: not necessarily; the laws are changing in some places. Last I heard, that braindead judge that ruled that radio isn't radio hasn't been overturned, which means even open access points fall under wiretapping laws in the US if you use them without permission 08:19 < Lucretius> im in europe 08:20 < skyroveRR> So? 08:20 < at0m> Lucretius: same here. the network should be explicitly "open". but your chances are small they'll file complaint. 08:21 < at0m> explicitly, i mean, advertised as being open to anyone to use 08:21 < at0m> like in a coffeeshop 08:22 < at0m> even visiting a web page that isn't explicitly made public falls under "unauthorized computer access" 08:25 < Lucretius> thanks for the information later 09:00 < Project86__> Wiretapping for monitoring an open network? Jesus 09:01 < SporkWitch> Project86__: like i said, that ruling was retarded. It effectively declared radio to not be radio 09:01 < Project86__> If they are willingly, against advises notifications, to NOT lock the network, they should be completely at fault 09:02 < Project86__> On what grounds is radio not radio?? 09:02 < SporkWitch> Project86__: not even that, the law was already clear: nonsecured radio broadcasts are not private 09:02 < SporkWitch> Project86__: the ruling completely ignores that and classifies 802.11x without any security as "not a radio broadcast" 09:03 < SporkWitch> because open radio broadcasts aren't private; you're welcome to listen. it's not even a hard thing to get around, even something as simple as PL codes, like some cheap walkie talkies have, meets the definition of security and makes the wiretapping laws kick back in 09:03 < Apachez> is it sending data over the air (eter)? then its a radiotransmitter 09:03 < Apachez> well we can go into freqs too 09:04 < Apachez> to rule out "lighttransmission" and stuff like that 09:05 < Project86__> Wait wait, so if 802.11 is NOT a radio broadcast, then how can one get in trouble for monitoring "nonsecured radio broadcasts" (that aren't radio)? 09:05 < at0m> SporkWitch: in US? here, it doesn't matter weither your garden is walled or not. threspassers threspass. 09:06 < at0m> be it unsecured wifi or netfacing website that isn't advertised 09:07 < Project86__> I smell some malarkey here 09:07 < SporkWitch> at0m: the scope was confined to the US earlier, yes. the ruling in question was specifically over google recording non-secure 802.11x traffic, which is VERY clearly public under the law, as it's a non-secure radio broadcast. The ruling completely ignores that and declares 802.11x radio broadcasts to be private; in short, you are not allowed to hear someone shouting into your ear 09:08 < at0m> but they're allowed to streetview your frontgarden eh. indeed a lil odd. 09:08 < Project86__> The level of retardation in that concept amazes me lol 09:09 < at0m> in practice, nobody will file complaint. but i just might sue gf's ex cos i can (suspected he was reading her emails, so i emailed her links to letters on my webserver instead of emailing her the full txt's. he delivered by visiting, though my pages had been removed) 09:10 < at0m> (he had also broken in to my house, twice, so yea he's a liability) 09:11 < Project86__> Use his id in several PayPal and credit card scams online. Game over lol 09:12 < Evidlo> do a murder on him 09:12 < Project86__> Should have had malware in those emailed links 09:12 < Project86__> Get in his machine 09:12 < Project86__> And do murder 09:13 < at0m> /o\ 09:14 < Evidlo> send malware, then do a murder Law Abiding Citizen style 09:14 < Project86__> ^ 09:14 < Project86__> Best style 09:15 < Project86__> All Punisher like 09:15 < at0m> i aint killing anyone. he might be stronger, i'm better with puters. might just get him a record, plus have his company phone records requested. his boss won't like. 09:16 < Evidlo> hack his computer and make it explode 09:16 < Project86__> Or just sign up for a bunch a gay sites with his credentials from his machine. Buy dildo in bulk, some wigs and make-up, all with his card. Screenshot the orders, post em on his social media...the works lol 09:17 < at0m> i don't plan on getting involved with him too much, and let the cops deal with that. 09:18 < at0m> but just giving an example of where prosecution may happen when folks "unauth access" to open computers or networks. 09:20 < at0m> as where mostly, those who don't publish open networks to be available to the public, wouldn't care for other people using the open wifi or non-pass protected non-published web pages. 09:20 < at0m> but strictly speaking, that's unauth'd access. 09:55 < Project86__> I had read somewhere (possibly on one of the irc channels), talking about making certain directories mountable, and unmounting it when connecting online (for extra safety). I can't recall the convo though, would you only want to encrypt and unmount the home direcory?.. Or how far up can you go and still have things work? 09:56 < Apachez> dunno what that would actually help for 09:56 < Apachez> sure you cant access whats not mounted 09:56 < Apachez> but if you got a 0day in your browser this 0day could mount stuff anyway 09:56 < Apachez> so physical separation is the only thing thats count 09:57 < Apachez> also you are expected to remount these partitions after you quick browsing? 09:57 < Apachez> how do you know that there is no 0day still running in memory waiting for you to remount? 09:59 < Project86__> You basically just unmount your important stuff in case someone gets in and is browsing I guess? Idk. I think they just said the home directory. And yes, unmount when online, when off, remount. Supposed to protect your saved work or something? 10:00 < Project86__> Like if you had really sensitive data in a subdirectory maybe? Not sure 10:00 < Project86__> It seemed to make sense 10:00 < at0m> until browser javascript mounts it again? 10:01 < Project86__> The browser still sees it? 10:01 < at0m> let alone sudo without pass 10:01 < Project86__> They were talking like it's some common thing and how to do it right 10:02 < Apachez> the thing is that makes very little sense 10:02 < Project86__> Didn't think of sudo without a pass part.. 10:02 < Apachez> first off your browser depends on your home directory 10:02 < Apachez> so if you want to browse unsafe stuff use a dedicated box with no sensitive data on it 10:03 < Apachez> or better yet not even a harddrive 10:03 < Apachez> boot from a dvd or such 10:03 < Apachez> webconverger.com 10:03 < at0m> tails.iso 10:03 < Apachez> whatever floats your boat 10:03 < Apachez> webconverger doesnt seem to have the bad stuff whcih tails have had during the years 10:04 < Apachez> and was more quick to update 10:04 < Apachez> anyhow use physical separation 10:05 < Project86__> Exactly, that was the other argument Apachez ,whether it's better to just not have a hard drive. I thought that unmounting it made it look like it didn't exist or something. (On linux btw) 10:06 < SporkWitch> precise: you gave me a hard time for the tin foil warning; he's proving me justified :P 10:08 < at0m> Project86__: well, the "looks like" is where you subscribe to the obfuscation part of not mounting 10:08 < SporkWitch> Project86__: you're on linux, the security is great and it's less of a target anyone. no one gives a shit about you. your proposal is marginally effective and massivelly inconvenient 10:08 < SporkWitch> s/target anyone/target anyway/ 10:09 < SporkWitch> Project86__: i mentioned threat modeling earlier, you need to look into it. Also consider the CIA principle of security: https://www.techrepublic.com/blog/it-security/the-cia-triad/ 10:11 < SporkWitch> actually, i don't like that link, because it ignores usability, which is an essential component of the A 10:12 < Project86__> I was just about to open it too 10:14 < SporkWitch> it's still decent, it just doesn't cover the most important point i was trying to make lol 10:17 < SporkWitch> bah, not finding one i like. In any case, one of the most important parts of Availability is USABILITY. Many things you do to secure something make it more inconvenient to use. If you make it too inconvenient, your own users will circumvent security by doing things like setting batteries on the keyboard to prevent it locking and putting passwords on postits (the former I actually saw done in a 10:17 < Apachez> Project86__: again, unmounting wont help 10:17 < SporkWitch> secure facility once; huzzah politics, i was the one that got in trouble for reporting it) 10:17 < Apachez> doesnt mean you cant unmount if you want to 10:17 < Apachez> but it doesnt give you the security you imagine 10:18 < Apachez> that cia triad is actually a cial square 10:18 < Apachez> logging is often missed in that 10:19 < SporkWitch> Apachez: logging falls under integrity, but it's really too low level for the concepts CIA addresses. 10:19 < Project86__> Maybe it was the whole home directory anyways, could have been Documents folder. Where you have important details of new projects..idk lol 10:19 < SporkWitch> the CIA triad is a high-level concept of what goals a security policy strives to achieve, not a low level description of implementation and components 10:19 < Project86__> *maybe it WASN'T 10:20 < SporkWitch> Project86__: as already stated, in your compromise scenario you're boned the next time you connect 10:36 <+catphish> morning 11:27 < skyroveRR> Afternoon catphish 13:18 < Alina-malina> is it possible to scan .onion servers with nmap? 13:18 < ethicalhacker> lmao 13:20 < needle> just do it 13:20 < ethicalhacker> use tor and proxy chains 13:20 < Alina-malina> needle, nmap: nsock_core.c:1258: nsock_pool_add_event: Assertion `nse->iod->sd >= 0' failed. 13:20 < Alina-malina> Aborted (core dumped) 13:21 < needle> so it looks like it would then not work. 13:21 < needle> I never tried this out, I thought it would handle .onion like any other DNS name 13:22 < Deknos> is there a portmapper/proxy software for my internetserver which accepts ipv4 connections and reroutes them to an ipv6 connection (with a possible different port)? i know there are services, but i kind of want to install it on my vps :) 13:23 < needle> Deknos: how is that supposed to work, IPv4 and IPv6 are different address families 13:23 < needle> If a host does not "speak" IPv6 what it would be good for? 13:24 < needle> It would never be able to connect to the "rerouted" IPv6 service. 13:25 < needle> on different TCP/IP socket 13:26 < Deknos> well, there seem to be services, which translate protocols on the higher level between ipv4/v6 (sixx did this, or?) or do i misunderstand sth here? 13:27 < Deknos> ah, someone said 6tunnel :) 13:28 < needle> Sorry i have misundestood your question then. 13:31 < detha> Deknos: for tcp connections, pretty sure relayd could do that 13:31 <+catphish> Alina-malina: if you configure nmap with a socks proxy it should worl 13:32 <+catphish> (specifically the tor socks proxy) 13:33 <+catphish> Deknos: you can definitely do what you want with haproxy 13:53 < mawk> Alina-malina: for applications not supporting proxies you can use a transparent proxy 13:53 < mawk> and permit your whole LAN to resolve .onion 13:53 < mawk> it's pretty cool 13:53 < mawk> it makes the tor router map addresses in some 172.16.0.0/12 network to .onion as soon as you try to resolve them using the special tor dns server, then when the router detects a connection to that range it sends it to Tor transparently 14:57 < lucido> Hi, I'd like to set up a wifi network where I have per client authentication based on Azure AD. Will WPA2 Enterprise work with Azure AD authentication? 14:58 < mawk> probably with some kind of adapter 14:59 < mawk> or even without 14:59 < mawk> research it a bit 14:59 < lucido> basically the target is that my windows 10 pro clients can connect to wifi with SSO 14:59 < mawk> yes 15:03 < djph> sure, WPA-Enterprise + RADIUS auth against a LDAP / AD backend is pretty common. 15:04 < djph> Not 100% sure if AD has RADIUS built-in, or if it's another component of a Win-Server installation. 15:04 < lucido> djph, problem is I have no LADP/AD backend, all I have is Azure AD 15:04 < djph> "Azure AD" is still Active Directory 15:05 < tester> is there something like traceroute, but that would show me physical hardware in the way? for example, i could tell pc connects to switch1, then switch2, then routerx, then routery, or something? 15:05 < lucido> there is a complicated solution that someone tried out, but I dont understand it AzureAD + AADDS + NPS VM on Azure 15:05 < lucido> from https://feedback.azure.com/forums/169401-azure-active-directory/suggestions/8816272-authenticating-wireless-access-points-radius-thr 15:05 < tester> specifically for the route between two nodes in the same local network 15:05 < djph> lucido: "LDAP / AD" is just "LDAP or AD" (didn't mean you needed two separate setups) 15:06 < lucido> djph, I have neither with Azure AD 15:06 < djph> lucido: I'm sorry, you don't have Active Directory with "Azure AD"? ATF!? 15:06 < djph> *WTF!? 15:06 < lucido> I know 15:06 < dogbert2> heh, djph 15:07 < djph> the goddamn fuck is "Azure AD", if not "Active Directory"?! 15:07 < tester> a way to make money, doh 15:08 < djph> tester: You'd probably need something to read the target MAC addresses -- but even that probably won't tell you which switches it hits, since a host doesn't send "to its switch" 15:09 < djph> lucido: apparently, your correct course of action is (1) tell whoever moved to azure that he was a fuckwit, then (2) reinstall local servers that actually run services you need, rather than marketing buzzwords. 15:09 < varesa> AAD is a very limited version of AD, IIRC not structured but a flat hierarchy of users/groups 15:10 < varesa> So AD but not exactly :) 15:10 < djph> ew, and people *pay* for this reduced functionality, when they've already been using "proper AD"? 15:10 < tester> djph ultimately i need to reorganize the cabling and move some devices to a new faster switch, but i rather figure out what goes where using software and not following cables :/ 15:10 < tester> am i out of luck? 15:11 < djph> tester: why bother with the cabl... ohh, you're in one of those places that the switches don't know where they are (should be) going? 15:12 < varesa> IIRC the full cloud AD is called "AD DS", while AAD is the lighter version 15:12 < djph> tester: way I've done it in the past is that switchport gets panel/port# as a description. 15:12 < tester> djph it's a mess. not too bad because it's only like 10 devices, but it's a mess. there are 2 uplinks, a couple of models, a router, switches behind it 15:12 < varesa> You can't join devices to AAD either 15:12 < lucido> djph, we never had an ad, Azure AD came default with Office 365. I'll try https://azure.microsoft.com/en-us/pricing/details/active-directory-ds/ and connect to it from my fpsense radius server 15:13 < djph> well, at least it was free. Maybe this is the point where you put on your bigboy pants and start running things in-house. 15:13 < djph> s/free/"free(tm)"/ 15:15 < djph> tester: hmm, wait, all 10 links are uplink / downlink to other network infra, or it's 2x uplink + 8x hosts (presumably workstations)? 15:16 < lucido> I'll try azure active directory services for 100/month before I deploy a local AD. I have multiple geographical locations and crap network connection 15:17 < djph> Your call. But asking a REMOTE AD server over that "crap network connection" is going to have more downsides than asking a local AD server... 15:18 < djph> at least in the site with the AD server. remote sites may well still be crap 15:18 < dogbert2> brb... 15:19 < lucido> I know, but at least I can rely on the cloud AD being available 15:20 < lucido> if I get a power or ISP outage, then the other locations are not affected 15:20 < lucido> I guess I could solve that with multiple local ADs too 15:20 < lucido> I mean DCs 15:29 < djph> or backup power / ISP connections 15:32 < badsekter> I have a tablet that keeps losing wi-fi and reconnecting in every couple minutes 15:32 < badsekter> is that bad for my modem? 15:33 < djph> no 15:34 < djph> although it *MAY* indicate that the Access Point is having trouble. 15:34 < badsekter> djph: thanks 16:24 < lucido> if I have a VPN in Azure that I connect to from two sites, then can the traffic be routed directly between the two sites or does it have to go trough Azure? 16:24 < djph> thru azure 16:25 < lucido> is there a way to bypass azure? 16:25 < lucido> establist a dirsct connection maybe 16:26 < lucido> I guess that depends on routing 16:26 < djph> sure, dont use azure as your VPN concentrator. 16:28 < dogbert2> hey djph 16:29 < djph> yo dogbert2 16:29 < dogbert2> gonna pick up a pair of toshiba 6TB drives for my NAS (can get them at frys) 16:30 < dogbert2> click image to see larger view 16:30 < dogbert2> Toshiba N300 6TB 3.5" NAS Internal Hard Drive - SATA 6.0Gb/s 7200 RPM 128MB Cache 16:30 < lucido> are there any wpn powered 5 port switches? 16:31 < lucido> dogbert2, how much? 16:31 < dogbert2> $175 apiece 16:31 < dogbert2> you can get VPN in the switch, you'll pay, and how often do you use it is the question? :) 16:31 < Apachez> dogbert2: why not 10TB drives while you are at it? 16:32 < dogbert2> Apachez...I've been reading some poor reviews on 10/12TB drives, even though the DS218+ can handle 'em 16:34 < Apachez> works fine here 16:35 < dogbert2> YMMV :) 16:37 < djph> "wpn powered"? 16:37 < Apachez> electricity powered 16:45 < lucido> djph, sorry poe powered 5 port switches 17:02 < ca_cabotage> hey all, I'm using unbound for DNS and was wondering if there is a way that i can config Unbound to use an outgoing port that is not 53? 17:03 < Apachez> doubt that 17:03 < Apachez> porr 53 is the dns port 17:04 <+catphish> ca_cabotage: dns servers will only respond on port 53, so no 17:04 < tds> you could probably change the outgoing port with a NAT rule if you really wanted to 17:04 < tds> as others have said though, that's not especially useful 17:05 < ca_cabotage> so if running multiple DNS servers on a network just both go out 53? 17:06 < Apachez> or PAT rule 17:06 < Apachez> since NAT only operates on src/dstip 17:06 < tds> yeah, I always forget to say that :) 17:06 < tds> I generally just assume that NAT means NAPT/whatever, even if it doesn't really 17:07 < patientplatypus> ive updated my stackoverflow question if anyone has any ideas they could add https://stackoverflow.com/questions/50195896/how-do-i-get-one-pod-to-network-to-another-pod-in-kubernetes-simple 17:08 < Apachez> whats a pod? 17:11 < Forst> ca_cabotage: defaults should work fine, connection tracking on the NAT should do all the magic 17:16 < mervin> hey. I need to enable ntp on a network used for a project, network made of two L3 switches and a SRX cluster with two fw's. I'm wondering what a 'best practice' design might look like. I'm thinking on having one device connected to a public NTP and serving also as NTP server for other devices in my network. any thought on this would be greatly appreciated. 17:16 < grawity> ca_cabotage: you can for explicit forwarders or stub hosts (using ip@port syntax), but not for general recursion 17:17 < grawity> or... was it port@ip? I can't remember. 17:17 < Peng> mervin: Can you have 3-4 NTP servers 17:17 < xingu> mervin: four is a good number of ntp things. 17:18 < grawity> four NTP servers seems a bit overkill 17:18 < xingu> mervin: ntp falseticker will eliminate one wobbly thing; three survivors will largely prevent pingponging between most and next most credible source 17:19 < Apachez> why would 4 be a good number? 17:19 < Apachez> 3 seems better 17:19 < xingu> ^^ 17:19 < xingu> feel free to repeat the science, just don't do it anywhere near a network I care about. 17:19 < mervin> :)) 17:20 < mervin> hi guys 17:20 < Apachez> well if you have 3 servers and one went mayhem the other two will have similar time 17:20 < Apachez> if you have an even number of servers you cant tell which time is correct 17:20 < mervin> first thing I'm considering is the contact to outside world... 17:20 < xingu> Apachez: the problem is that the downstream will pingpong with two survivors 17:20 < Apachez> nope 17:20 < mervin> and that's why I said to have only one device connected to outside world and others... 17:20 < Peng> xingu: But with 4, you can ping pong between 2 pairs of 2 17:20 < Apachez> not if these two have equal time 17:20 < mervin> connected to this one 17:21 < Peng> So, 5 17:21 < Apachez> if you got 4 servers and 2 of them went bogus you got yourself a pingpong situation 17:21 < Apachez> so even number of ntp servers is the prefered one 17:21 < Apachez> err 17:21 < Apachez> odd :) 17:21 < Apachez> like 1, 3, 5 etc 17:21 < Peng> I think 3 has disadvantages 17:21 < Peng> Well, I think 3 doesn't have advantages 17:22 < Apachez> with 1 server you will just have to accept the time it sends you 17:23 < Apachez> with 2 servers you can take the average of the two of them 17:23 < grawity> and if that's a server you manage, probably not gonna be a problem 17:23 < Apachez> the problem you have is that you cant tell which of these 2 is the most correct 17:23 < grawity> as long as the server itself has enough upstreams 17:24 < Apachez> if you got 3 then its as with 2 the average of the three of them, if one goes rogue you can tell because the other two will have similar time while the 3rd doesnt so you can ignore the 3rd server 17:24 < mervin> hey 17:24 < Apachez> then with 4 its the same situation as with 2... if one goes rogue you can tell but if two goes rogue at once you cant 17:24 < Apachez> like 2 servers says 12:00 and two says 13:00 17:24 < Apachez> which one is the correct? 17:24 < mervin> why would I need more than a server anyway 17:24 < mervin> HA ? 17:24 < Peng> mervin: Yes. In case it's down or wrong. 17:25 < mervin> ntp doesn't require that much of attention as I need it only for correct timestamp in logs 17:25 < Peng> You'll regret neglecting it if it's down or wrong. 17:25 < mervin> why? will it set a bogus time? 17:25 < grawity> why would it be wrong 17:25 < mervin> its down, ok, leave the clock as it is 17:25 < mervin> untill its up again 17:25 < mervin> isn't it like this ? 17:25 < Peng> Clocks don't stay as they are. 17:25 < Apachez> time on its own doesnt skew that much 17:26 < Apachez> unless you are heavy on vm guests 17:26 < grawity> I mean, this isn't about relying on a single *third-party* server or anything like that 17:26 < Apachez> they can skew 2 weeks in one real day 17:26 < Peng> Apachez: Don't use terrible VM platforms? 17:26 < Apachez> so having lets say 3 ntp servers (and 3 sources too) is not only redundancy but also give a statistical way for the ntp client to determine what the true time is 17:26 < Apachez> Peng: most vm plattforms have this issue 17:27 < Apachez> specially when you have "green" and shit involved 17:27 < Apachez> cpucycles goes up/down etc 17:27 < Peng> Apachez: I couldn't say, I just use KVM and Xen. 17:27 < mervin> as you say it, its better to have it set manually 17:27 < mervin> :)) 17:28 < Forst> isn't syncing time with the host going to eliminate the vm problem? since the host has a proper rtc 17:29 < Apachez> Forst: thats one way to deal with that, but then you must have drivers for this installed in the vm guest and enabled this at the vm host 17:29 < Forst> that doesn't seem like a big problem to me tbh, especially if there are prebuilt packages for that 17:29 < Peng> You also have to trust that the host is correct. 17:30 < Apachez> well welcome to my world :P 17:30 < Peng> Which is fine when you're running it, but less reliable on [random VPS company] 17:30 < Forst> sync the host itself via ntp, of course 17:30 < Peng> Right right 17:30 < Apachez> hyperv seems to be the worst option when it comes to these things 17:30 < Forst> true, but I think the original question was about a self-hosted situation 17:31 < Apachez> if you dont have the hyperv driver for their nic you are stuck with some decnet 100Mbps virtual nic 17:31 < Apachez> compared to many other vm engines who uses intel pro nics as exposed to the vm guests 18:13 < ben______> Sorry for the noob question; How can i tell if my networkcables are "slow ones" without looking at them? 18:13 < djph> ben______: "slow"? 18:13 < ben______> I mean, can i tell by looking at which lights lite up on the switchport? 18:14 < djph> no 18:14 < Emperorpenguin> depends 18:14 < djph> you can tell whats been negotiated 18:14 < Emperorpenguin> ben______: you meen 100m or 1g? 18:14 < djph> e.g 10/100 vs. gbit 18:14 < Emperorpenguin> some switches light the LEDs up differently 18:14 < djph> but, that wont tell you about the *cable* 18:15 < ben______> Im new to networking,. Once i changed on of my cables and it started working much faster.. i don't know if it was because it was cat5 ? 18:15 < SporkWitch> if it's managed, it'll probably tell you the link quality as well; even my SOHO Asus routers will tell you whether the device is running 10/100 or GBE 18:15 < djph> "maybe", or a bad cable, or ... 18:16 < ben______> Emperorpenguin: yes i mean the colors of the switch.. what they mean. I don't know where to troubleshoot. 18:16 < djph> i mean, if the cable is "regular" cat5 (which hasnt been around in AGES) is 10/100 only, iirc. 18:17 < djph> read the switch manual for what they mean. but also look at whats plugged in -- e.g. if the deviceis only 10/100 ... 18:17 < SporkWitch> correct 18:18 < ben______> I have got pretty modern network gear, but the fastest file transfer speed i get on my lan is round 40MB/sec is that normal on a gigbit network with machines with SSD disks? 18:18 < djph> fir most consumer kit, yes. 18:19 < ben______> ok, thanks djph. Good to know 18:19 < Dagger> I can manage 80-90 MB/s just fine between two Linux machines... 18:19 < Dagger> yet I'm lucky if I can manage 40 MB/s to my Windows (XP) machine 18:19 < djph> i mean for "consumer" PCs, etc. the *network* may still be qble to handle faster. 18:20 < tds> if you're concerned that the network is the issue, you can always test just that (and eliminate things like disk bandwidth) with iperf 18:20 < djph> ugh, damn this phone kb. 18:21 < ben______> I've heard about iperf yeah. it needs a serverside and client right? 18:21 < djph> yep, though its just options when running it 18:22 < tds> yes, though iirc iperf3 will test in both directions when you run it 18:23 < SporkWitch> djph: swiftkey is your friend 18:23 < ben______> Dagger: how do you send files at 90MB /s? And why would winXP be slower? 18:24 < SporkWitch> ben______: because Windows' network stack is horrid and tacked onto that single-user operating system as an afterthought 18:24 < ben______> Is SMB / windows filesharing slow? 18:25 < ben______> SporkWitch: mm whats what a friend of mine at IT said once. I never understod why though. He said win machines produce alot of garbage packets on the lan? 18:25 < SporkWitch> ben______: that's more to do with the proprietary stuff like NETBEUI 18:26 < SporkWitch> windows hosts are NOT quiet neighbours 18:26 < djph> SporkWitch: no workie with connectbot 18:26 < ben______> SporkWitch: ok. Is that just related to old winXP or newer win10 too? 18:26 < ben______> ok 18:26 < Dagger> sshfs or NFS. in fact I bet samba would work at that sort of speed between two Linux machines 18:27 < SporkWitch> djph: working fine here... 18:27 < djph> ben______: win in general is slower, thanks to SMB,etc. 18:27 < Dagger> XP only supports SMB1 though, which might be related to why I never get decent speeds to that machine 18:27 < djph> SporkWitch: hmm, maybe i goofed something again 18:28 < SporkWitch> djph: dunno; i installed connectbot again the other night, hadn't used it yet, so when you said that i started it up and opened a local shell, swiftkey working fine 18:28 < grawity> when copying large files, SMB3 between Server2012 saturates 1 Gbps with no problems 18:28 < djph> SporkWitch: yup, i probably broke something 18:28 < SporkWitch> djph: been using juicessh for a while now, much nicer, though it's paid. I reinstalled connectbot to keep an eye on it and wait for them to merge the pull request from openkeychain adding support for auth keys 18:29 < grawity> juicessh is nicer as long as you don't use mosh (terminal bugs) or in general expect any updates :( 18:29 < SporkWitch> (hopefully they add support in password-store as well; really had needing to set up client keys when i have perfectly good yubikeys holding my main keys) 18:30 < ben______> Regarding the consumer network hardware. I have two Netgear GS108T (managed) switches and one GS105( unmanaged ) is 40MB/s as fast as they can do? 18:30 < SporkWitch> grawity: i never ran into any issues with its mosh implementation, though in fairness i've not used mosh in a long while. i set up my zsh to automatically launch/attach-to-running tmux session and disconnect by detaching 18:30 < grawity> SporkWitch: well 18:30 < djph> ben______: test w/iperf 18:30 < grawity> weechat in tmux in mosh 18:30 < SporkWitch> s/had needing/hate needing/ 18:30 < grawity> is *horribly* glitchy with current juicessh 18:31 < SporkWitch> grawity: that seems unnecessary; why combine tmux and mosh? why not just ssh and tmux? 18:31 < ben______> djph: ok. i'll test with iperf tonight. 18:31 < grawity> SporkWitch: for faster / more transparent roaming 18:31 < grawity> I don't want to reconnect every time 18:31 < SporkWitch> grawity: that's what i suspected; makes sense. How is mosh these days? Like i said, haven't used it in a couple years 18:32 < grawity> especially when I'm working *with* the network, and enjoy transparently roaming between LAN and 4G whenever I break routing or something 18:32 < grawity> mosh is decent, in general 18:32 < grawity> development seems to have slowed down to near-zero though (so stuff like agent-forwarding isn't merged afaik) 18:32 < grawity> but current state works well enough 18:33 < ben______> Im also wondering. Is it possible to share my LAN at my house with my girlfriends LAN over the internet? I was thinking shareing SMB over a SSHtunnel? 18:33 < grawity> only juicessh has a particularly bad combo of buggy terminal emulation and old mosh 18:33 < grawity> which affects even SSH, only to lesser extent 18:33 < grawity> ben______: yeah just set up a VPN 18:34 < grawity> SMB is just tcp/445, but there are some things that make it inconvenient to ssh-tunnel 18:34 < grawity> like Windows not accepting a port specification 18:34 < ben______> grawity: mm, VPN isn't easy to setup though, and I think it will force my whole laptop to use the VPN? 18:34 < grawity> uh, no 18:35 < grawity> if you want everything to go through VPN, push a default route 18:35 < grawity> if you don't want it, don't push a default route 18:35 < ben______> "push a default route"? 18:37 < grawity> generally VPN software let you choose what to route through the VPN... the same way as regular LAN routes work 18:38 < grawity> if you don't add a route that makes everything go through the VPN ... then it won't go through the VPN. 18:41 < routingloop> ran into a problem with pushing a default route to a client laptop the other day 18:42 < routingloop> seemed like the local endpoint routing table was preferring the local LAN for anything 10.0.0.0/8 because someone decided that was a good netmask to use on the wireless 18:42 < routingloop> so anything the client tried to reach starting with 10.x.x.x flooded onto the LAN instead of over the vpn tunnel adapter 18:43 < routingloop> still not sure why the coffee shop wifi the user was on decided to use a /8 18:45 < grawity> kind of a general problem with IPv4 :( 18:46 < routingloop> yeah 18:46 < routingloop> unfortunately we don't have even a long term "let's enable ipv6" plan where I work 18:47 < grawity> we almost had the opposite problem at work 18:47 < routingloop> they're fine with ipv4 and in some departments disable ipv6 on standard imaged laptops 18:47 < grawity> we *do* have IPv6, but some employees have to VPN into an external government-ish service, and the VPN client disables IPv6 while connected because Cisco thought that's not stupid at all 18:48 < grawity> screwing up all LAN access while connected 18:48 < grawity> (fortunately the same service has access via "web VPN" so we don't have to use the client...) 18:50 < ben______> Another question: For those who are alittle paranoid, how have you setup your mobile phones? do you run another OS like sailfish or lineageOS? 18:50 < routingloop> and you don't manage the external government-ish vpn? 18:50 < routingloop> or is it a cisco feature 18:50 < grawity> we just have client access to that 18:50 < grawity> and it's a cisco feature, yeah 18:53 < routingloop> im not paranoid anymore, it was too much mental energy wasted imo 18:53 < routingloop> if someone really wanted to spy on me they'd already have done it 18:53 < routingloop> best case I keep script kiddies out 18:55 < SporkWitch> routingloop: that's what i call the "no one gives a shit about you" principle, and 99% of the time it applies to the people asking 18:56 < grawity> I don't think that philosophy applies when accessing people's medical information 18:57 < routingloop> yep pretty much 18:58 < routingloop> at this point in my life I'd rather just keep my mental energy for other things to worry about 18:58 < routingloop> kind of a stoicism principle really. worry about the things you can control 18:58 < SporkWitch> grawity: standard precautions are sufficient for the users; the target is the datacentre. you know full well the types i'm talking about that make up the overwhelming majority of people asking how to "protect" themselves on irc 18:59 < routingloop> so yes, do some things to protect yourself against spying and protect your privacy, but don't go too deep down the rabbit hole 18:59 < grawity> SporkWitch: you know full well I was talking about employees, not users 19:00 < SporkWitch> grawity: yes, i can see that you may have been trying to shift scope 19:01 < routingloop> if we're talking a corporate work environment the datacentre is always the end goal 19:01 < routingloop> for a red team 19:02 < routingloop> but they'll likely start with a breach at the client/employee laptop level or through improperly configured network perimeters 19:02 < routingloop> then work their way up 19:02 < SporkWitch> routingloop: or just walk in the lobby and grab the first open network port lol; almost no one seems to use port security 19:03 < routingloop> im actually in the process of rolling out eap-tls 802.1x company wide 19:03 < routingloop> based on my initial proof of concept it does seem like it is a rarely used feature 19:03 < routingloop> so many people do the easy way like eap-peap instead of doing true certificate based authentication 19:04 < routingloop> luckily for me, most of our offices have physical security and no open ethernet jacks outside the badge in chokepoints 19:04 < SporkWitch> routingloop: that's one i've never gotten. horrible as AD is, one thing it _is_ good at is PKI 19:04 < routingloop> if properly configured yeah 19:05 < routingloop> make your root ca an offline and set up intermediaries 19:05 < routingloop> which then sign certs for user laptops 19:05 < addsub> greets 19:05 < routingloop> hola 19:05 < addsub> anybody familiar with hikvision? 19:05 < SporkWitch> routingloop: as to port security, it's not like you need to go full this-port-with-this-mac; a simple mac whitelist would be plenty sufficient to defeat the random walking in and plugging in 19:06 < routingloop> absolutely would, yeah 19:06 < SporkWitch> addsub: If you have a question, just ask! For example: "I have a problem with ___; I'm running Debian version ___. When I try to do ___ I get the following output ___. I expected it to do ___." Don't ask if you can ask, if anyone uses it, or pick one person to ask. We're all volunteers; make it easy for us to help you. If you don't get an answer try a few hours later. 19:06 < addsub> something funny happened. Somebody got it installed and in order to work on his own place it needs a SHARE account/ticket from the 'associate' who did the installation in order to see the cams. 19:06 < addsub> does this sound right? 19:06 < routingloop> however that can become OpEx heavy and require constant updating, right? 19:06 < addsub> I am sure this person can go on the device and do a hard reset and start clean without the associate. 19:06 < routingloop> whitelisting or a positive security model always seems to grow exponentially in time to maintain 19:07 < SporkWitch> routingloop: i don't see why; tech refreshes tend to be on fixed schedules, so if you can get the MACs on the invoice you could automate 19:08 < routingloop> we have a lot of laptops in production that are from forever ago 19:08 < routingloop> people don't like to give them up and our IT doesn't enforce a refresh policy 19:08 < SporkWitch> routingloop: initial setup is always a pain if things weren't properly documented initially 19:08 < addsub> then when trying to figure out why it wasn't working remotely he quickly checked his 'admin' account to see whether it was working properly. 19:09 < routingloop> so for a company that has a mature security policy than it may not be a huge issue... not so much for me ;) 19:09 < routingloop> have to be smarter than the business 19:09 < SporkWitch> routingloop: though you could arguably use arp tables ss a shortcut; would catch any existing unauthorized devices and add them too, but they were on there if you did nothing anyway 19:09 < addsub> and it worked fine for him. But then he didn't wanna share his 'admin' account. 19:09 < routingloop> afk 19:10 < SporkWitch> addsub: ask the vendor; i fail to see what this device-specific question has to do with networking 19:11 < addsub> SporkWitch: remote viewing? that goes through a network. 19:11 < addsub> a series of tubes 19:11 < SporkWitch> addsub: allow me to rephrase: this is not a networking issue, talk to the vendor 19:12 < alexandre9099_> hi, doe powerlines use live or neutral for data transmission? 19:12 < alexandre9099_> (or ground) 19:12 < SporkWitch> alexandre9099_: https://lmgtfy.com/?s=d&q=doe+powerlines+use+live+or+neutral+for+data+transmission 19:12 < addsub> SporkWitch: ok, just sharing in case anybody else faced this situation. 19:13 < SporkWitch> addsub: so post it on the vendor's forums 19:13 < alexandre9099_> SporkWitch, oh, ddg did not show me any good results :D 19:14 < SporkWitch> alexandre9099_: try restructuring the query; it is a google question, though and you shouldn't have much difficulty finding results 19:14 < alexandre9099_> (i didn't knew that lmgtfy had ddg search :D) 19:14 < SporkWitch> alexandre9099_: not sure when they added it, but they did :) 19:15 < SporkWitch> now if i could just figure out why autokey keeps "falling asleep"; can't figure out any reproduction steps, it just randomly stops triggering until i open the window 19:16 < SporkWitch> (i set up a hotkey to take selected text and paste in a lmgtfy link for it :P) 19:17 < alexandre9099_> i still don't find any answer :/ 19:18 < alexandre9099_> it seems to be on the phase 19:26 < SporkWitch> alexandre9099_: https://lmgtfy.com/?s=d&q=doe+powerlines+use+live+or+neutral+for+data+transmission 19:26 < SporkWitch> d'oh 19:27 < SporkWitch> alexandre9099_: "how does powerline ethernet work" turns up several that explain it 19:31 * dogbert2 puts back the old style windows XP network activity icon in windows 7 :) 19:31 < dogbert2> SporkWitch...works pretty well for ethernet access, IMO w/out pulling cables through the attic, etc 19:32 < SporkWitch> dogbert2: i have a fibre connection, i'd rather not drop back down to a couple hundred kilobits 19:33 < dogbert2> yeah...I'm talking about wiring the entire house for cat6, etc... 19:34 < SporkWitch> O.o 19:40 < dogbert2> some ph33r: 10:40:04 up 7 days, 2:43, 1 user, load average: 0.00, 0.00, 0.00 19:40 < addsub> dogbert2: that's actually a good idea. cat6 cabel nowadays is dirt cheap. 19:41 < dogbert2> ayup... 19:50 < koops> Which is currently a better option, Puppet or Ansible? 19:51 < SporkWitch> koops: https://lmgtfy.com/?s=d&q=Which+is+currently+a+better+option,+Puppet+or+Ansible 19:52 < addsub> ha ha! 19:52 < koops> That isn't helpful. 19:52 < SporkWitch> of course it is 19:52 < addsub> SporkWitch: what about some personal opinion? in the end irc is another source of help independent from google 19:53 < koops> Especially since I did google, and I wanted to hear opinions of people who used this software. 19:53 < koops> I am completely new to both. 19:53 < addsub> is like if I google some question and I get the following result 'lmirctfy' pointing to freenode. 19:53 < SporkWitch> addsub: survey questions are generally discouraged as they are rarely, if ever, educational or productive. The query is a google question and invitation for "mine's the best; no mine is" 19:54 < addsub> SporkWitch: though I agree about reading a bit priorily. 19:54 < SporkWitch> addsub: if you've ever seen that, the poster is retarded. documentation → forums → search → irc 19:54 < koops> Anyway, did anyone here use either? 19:55 < SporkWitch> koops: http://www.catb.org/~esr/faqs/smart-questions.html 19:56 < koops> I read this long time ago. 19:56 < koops> What I wanted to hear is at least some differences between these, and reasons why to choose either of them. 19:56 < SporkWitch> sounds like you could use a refresher 19:56 < SporkWitch> well that's a whole different question from the one you asked 19:56 < koops> It's insecure HTTP too. 19:56 < koops> It's 2018 already lol. 19:57 < SporkWitch> https://lmgtfy.com/?s=d&q=comparison+puppet+ansible 19:58 < koops> And if I wanted a comparison from an actual user, and not from a random guy? 19:58 < koops> infoworld as first result lol. 19:59 < SporkWitch> oh, for that: [13:57:02] https://lmgtfy.com/?s=d&q=comparison+puppet+ansible 19:59 < koops> most of results are commercial websites. 19:59 < SporkWitch> cool; read some of them 19:59 < SporkWitch> it's a shit question easily googled 20:00 < koops> Of course I'm supposed to trust commercial websites. 20:01 < rewt> koops, compare their feature lists, and look at where they differ and how those differences would be affected by your environment 20:01 < SporkWitch> so not just lazy, but intentionally obtuse 20:02 < SporkWitch> make sure you do it over tor; the government is watching you 20:02 < SporkWitch> they're out to trick you into using the wrong one 20:03 < koops> fuck you :-D 20:31 < gde33> they see you naked all the time 20:33 < hexein> eeek 20:47 < Ugly-051> Any pros and cons between netem vs wanem? 20:48 < SporkWitch> Ugly-051: https://lmgtfy.com/?s=d&q=comparison+netem+wanem 20:49 < Ugly-051> sporkwitch: Just wanting personal opinions on here, not just on web :) 20:49 < Ugly-051> sporkwitch: I have looked 20:49 < SporkWitch> Ugly-051: then go find a review site 20:51 < Ugly-051> sporkwitch: So have you personally used either of them? :) 20:51 <+catphish> SporkWitch: please stop doing that 20:51 < SporkWitch> catphish: i'll stop giving them google when they stop asking google questions 20:52 <+catphish> there's no such thing as a google question 20:52 < Ugly-051> sporkwitch: it's not a google question, I can google fine, I just know there is better knowledge in this channel for stuff like this :) 20:52 <+catphish> people are welcome to ask here, and we're welcome not to answer :) 20:52 < Ugly-051> Thank you catphish :) 20:53 < SporkWitch> there is such a thing, and that's it; but you're right, they can ask google questions, and i'll point them to the resources to answer their question 20:55 < Ugly-051> So out of curiosity sporkwitch what is your experience with these two apps? 20:55 <+catphish> i also don't know the answer, never used either, they seem to serve similar purposes 20:55 < SporkWitch> they are apps that exist for which there many resources answering your question, all easily found with your search engine of choice 20:55 < Ugly-051> So nothing then... 20:56 < SporkWitch> didn't say that, said i'm not doing your google search for you 20:56 < Ugly-051> But thanks anyway... 20:56 < Ugly-051> You didn't need to 20:56 < Ugly-051> I already did, but came here for extra advice 20:56 < SporkWitch> well you were clearly having difficulty with it 20:56 < Ugly-051> Nope 20:56 <+catphish> there's a good list of features of netem here https://wiki.linuxfoundation.org/networking/netem 20:56 < SporkWitch> Ugly-051: so if you already searched it to you have a SPECIFIC question you need help with? 20:56 <+catphish> wanem has no such feature list :( 20:57 < SporkWitch> Ugly-051: as structured, your query is answered by google; if you have something in particular you'd like to know that you didn't understand / find, that would be something productive to ask a person about 20:57 <+catphish> i'd start with the linux one personally 20:57 < Ugly-051> catphish: Aye I've used Wanem before on GNS3 and was looking for reasons to use netem 20:58 < Ugly-051> catphish: I'm probably going to use netem with a phsyical device as a bridge for alab 20:58 < Ugly-051> a lab* 20:58 < ca_cabotage> hey all - I've got several networks running Unbound for DNS resolution. One of those networks is huge, like DNS cache in the hundreds of thousands, approaching million huge. The other networks are very small, also - those other networks have fairly high latency connections, so DNS resolution is pretty high for un-cached content. pre-fetch is pretty good but i 20:59 < ca_cabotage> i want more. So my thought was, use dump_cache on the huge network to a file, send that file out to the small networks, and use load_cache on their networks at regular intervals 20:59 < ca_cabotage> this way the little networks get the benefit of the huge network cached resolutions - would this work? 21:01 < detha> ca_cabotage: possibly, depending on what is being resolved. Analyze cache misses in the small networks, check if they would have been resolved using the large cache file. 21:03 < Emperorpenguin> yeah look into it because with how dynamic DNS is nowadays you might end up loading a ton of already invalidated stuff and break things 21:03 < Emperorpenguin> or at least un-optimise them 21:04 < detha> ne'er mind CDN's steering stuff and geoloc-aware things yeah 21:04 < ca_cabotage> yeah, i might have to test with some sites with very small TTL's 21:05 < ca_cabotage> pipe size isn't really a factor, smallest pipe should still be able to transfer the cache file in less than 10 sec without putting noticeable strain on the network for other users. so maybe just doing really high-freq transfer? 21:07 < VincentHoshino> hmmm how hard is it to reset a Brocade TurboIron 24X TI-24X-AC back to factory default? 21:07 < detha> Ideal solution, if you have the bandwidth: snoop on all DNS requestst of the large network. Pipe those to the small networks, let the re-do the same thing into their cache 21:29 < sunrunner20> stupid question. I've got a VMware VM running with bridged networking. an ifconfig 192.168.1.3 should be enough to get me access to that network segment, right? 21:29 < sunrunner20> latest fedora version if it matters 21:34 < djph> sunrunner20: netmask? 21:35 < sunrunner20> djph, didn't change from what dhcp assigned it 21:35 < sunrunner20> still a /24 CIDR 21:35 < tds> btw, ifconfig is deprecated ;) 21:35 < djph> then you should access 1.0/24 no problem. unless youre trying to access the vm_host from the vm 21:36 < sunrunner20> nope djph 21:36 < sunrunner20> I have a 172.0.0.0/24 that I put a device with a 192.168.1.0/24 on it and I need to access it 21:37 < sunrunner20> tds, yes but it still works for simple stuff. 21:37 < djph> then route 21:37 < sunrunner20> iirc the new command its inet addr 21:37 < sunrunner20> djph, is temporary, but I'll see if I can add a route 21:38 < tds> yeah, you'd probably want to use ip address add 21:38 < tds> (and you can shorten those, I suspect ip a a would work) 22:07 < royal_screwup21> I'm trying to wrap my head around this nesting: IP header -> TCP header > (http header & data). Can someone please walk me through why it's nested the way it is? Like, what's the relation IP and tcp header? 22:08 < royal_screwup21> between* 22:09 < IhrFussel> Any idea why those lines appear when I run "sudo tcpdump" on Ubuntu? https://paste.ubuntu.com/p/krqmXSBdhr/ << especially the Bluetooth ones 22:09 < Forst> IhrFussel: because tcpdump supports capturing from Bluetooth adapters 22:10 < IhrFussel> Forst, ah thanks =) and the other lines are also common ones? Nothing to worry about? 22:11 < Forst> yes, it's absolutely normal. promiscuous mode simply means that an adapter is forced to accept any frame that it receives. the default behavior is to accept frames addressed either to it or everyone (broadcast) 22:11 < SporkWitch> royal_screwup21: you want to read up on the OSI and TCP/IP models 22:12 < Forst> you shouldn't be looking at the kernel log unless something's broken :) 22:14 < IhrFussel> Forst, well I checked dmesg and found some weird lines "Process accounting resumed" so I decided to watch it more closely ... the lines were likely caused by atop 22:15 < Forst> it all sounds normal to me :) no reason to worry 22:16 < IhrFussel> Does tcpdump slow down the machine a lot? Or is it relatively lightweight? 22:17 < SporkWitch> no more than anything else that listens on the network 22:17 < Forst> it might slow down traffic forwarding 22:18 < Forst> that's what it did in my case on an rpi 22:19 < IhrFussel> I wonder if I could monitor the traffic well with it cause of this "[9443279.493512] TCP: request_sock_TCP: Possible SYN flooding on port 80. Sending cookies. Check SNMP counters." 22:19 < tds> depending on the options you run tcpdump with, you'll generate a load of rdns lookups as well 22:19 < sunrunner20> ended up using ip addr guys, thanks 22:19 < sunrunner20> let me add an extra IP instead of changing it completely 22:20 < Forst> ooh indeed, tds made a good point, I suggest running it with "-n" to disable rdns lookups 22:20 < IhrFussel> ^ If I only have a few of those lines... could it still have been an attack? 22:26 < Forst> could probably be some bot running an automatic scan on the web server for typical vulnerable applications 22:27 < Forst> you could check access.log to see if that's the case 22:29 < IhrFussel> I use lighttpd as web server...can't find it there only var/logs/lighttpd/error.log 22:30 < Forst> you might as well have lots of 404s for non-existing paths that were attempted 22:31 < zamanf> hello 22:32 < zamanf> I am looking to buy a new router. Do you know any router that is accessible through ssh and runs like a server? so I can run iptable rules in it 22:32 < Forst> any router that supports openwrt 22:34 < Forst> IhrFussel: if you're indeed getting lots of 404s from bots and it's troubling you, you might want to look at fail2ban 22:35 < badsekter> zamanf: you could just use an old pc with linux on it as a router 22:36 < IhrFussel> Forst, I already use fail2ban which is why I'm kinda confused that such lines appear in dmesg ... I grepped error.log and error.log.1 for "403" "404" "500" no results 22:36 < lan> Need help replacing my tp-link router with a airport express... 22:38 < lan> what's the diference between a WAN port and an ADSL port? 22:39 < Forst> IhrFussel: did you match up the times of dmesg entries and error.log entries? it might be in the older ones 22:39 < Forst> lan: WAN is basically Internet, ADSL is a specific technology to connect to it over phone lines 22:42 < lan> Forst: so are they besically two different ports? 22:42 < badsekter> lan, i am guessing the WAN port on the router is for an ethernet cable, and the ADSL port is for a phone cable... so WAN would be for fiber 22:42 < badsekter> lan, are you looking to buy a router? 22:42 < Forst> lan: WAN could be any port physically (Ethernet over twisted pair, fibre, ADSL, cable etc) 22:43 < IPoAC> I didnt see home routers supporting fiber, so I guess what you are looking for is the same thing basically, when they write WAN or Internet they basically mean Internet gateway so same thing 22:44 < lan> badsekter: I need to connect an adsl modem phone line to an airport express router 22:44 < Forst> there are definitely home routers supporting fiber, there are some GPON deployments with fiber to the house/apartment 22:45 < Forst> lan: for that you need a modem, which should usually be provided by your ISP 22:45 < IhrFussel> Forst, someone in #lighttpd told me that the web server doesn't log 403,404 and 500... 22:46 < badsekter> lan, the device has both a WAN port and an ADSL port? which one worked? did you try both? 22:46 < Forst> IhrFussel: nice webserver xD wonder what's the point of error.log if it doesn't log any errors :D 22:47 < lan> my tp-link router has an adsl port for that specific purpose while the airport express one has only a WAN port 22:47 < IhrFussel> Well it does log errors but apparently only once that are not that important...like "2018-05-06 22:46:53: (mod_fastcgi.c.2695) FastCGI-stderr: PHP Notice: Undefined variable: smsg in /var/www/post.php on line 45 22:48 < Forst> how is that a "not that important" warning? :D 22:48 * variable logs lhunath 22:48 < badsekter> lan, and the tp-link one is dead? so you want to use the other one for ADSL? is the WAN port on it even for the phone line? 22:48 * variable logs IhrFussel 22:48 < Forst> lol 22:49 < IhrFussel> So it's important to init a PHP var before assigning a value? 22:49 < Forst> airport devices only have ethernet afair 22:50 < variable> IhrFussel: depends on the kernel 22:50 < variable> but you probably won't notice anything 22:50 < Forst> assigning a value is initializing, isn't it? 22:50 < IhrFussel> variable, 4.4.0-108-generic 22:50 < variable> IhrFussel: what is that? 22:51 < IhrFussel> Kernel version 22:51 < variable> what kernel? 22:51 < IhrFussel> Linux 22:51 < variable> oh. Linux traditionally has not-amazing networking perf 22:51 < variable> though it can be tuned 22:52 < lan> Forst: my current setup is a modem connected to both a phone and adsl port of the router 22:52 < zamanf> badsekter, what do you mean, use a pc as a router? how can I give wifi to other pc's? 22:53 < variable> zamanf: that is entirely doable, though with most consumer wifi cards you can not connect to wifi at the same time 22:53 < lan> badsekter:yes, that's what I'm asking myself too 22:53 < variable> you need to be ethernet or otherwise connected 22:55 < zamanf> ok, so I will connect the pc to the modem and from pc how I can share internet with other devices? let's say we need only wifi access. are there specific wifi cards that will act as a wifi access point? 22:55 < zamanf> while I get internet using wifi to connect to my modem? 22:55 < Forst> IhrFussel: I'm not sure if fail2ban will be able to determine scans then, since there is no 404 logging 22:55 < lan> Forst: they both have WAN/LAN ports 22:55 < Forst> what it does is check the logs pretty much 22:56 < variable> use blacklistd 22:56 < Forst> lan: maybe you meant a splitter? 22:56 < variable> it has integration with the utilities 22:56 < variable> instead of scanning log files 22:57 < m|st> zamanf: you want to connect your pc to modem via ethernet and provide wifi for local bxes? 22:57 < badsekter> zamanf, google "linux as router" lots of resources 22:57 < lan> Forst: can I connecte the phone line adsl port from my modem to the WAN port of the airport express for internet connectivity? 22:58 < badsekter> m|st: he originally asked how to find a router that he can shh into and run iptables on, and i suggested just using and old pc with linux on it 22:58 < m|st> ah i see, yeah good suggestion 22:58 < Forst> lan: phone cable goes into the modem, ethernet cable goes both into modem and airport (WAN) 23:01 < variable> badsekter: personally I'd use pfsense 23:01 < variable> its tuned/designed for this use case 23:01 < lan> forst: thanks for your help 23:01 < Forst> lan: not at all :) 23:03 < sunrunner20> how bad are extra SSIDs for wifi performance? 23:04 < lan> my modem basically has two ports; adsl and telephone 23:04 < m|st> depends on ur loads sunrunner20 23:04 < Forst> lan: I have a strong suspicion that what you're describing is a splitter 23:05 < variable> sunrunner20: depends how they are implemented too 23:05 < lan> with my tplink I connect the adsl port of the modem to the adsl port of the router 23:05 < Epic|> More than a few ssids can be significant 23:05 < variable> Is it the same channel with different virtual BSSIDs ?\ 23:05 < variable> different channels? same radio? 23:05 < variable> different radios, different channel 23:05 < variable> different radio, same channel 23:05 < Forst> lan: could you give us model numbers for both tp-link and modem, please? 23:05 < m|st> ^ 23:05 < variable> iow not-enough-info 23:06 < variable> sunrunner20: most COTS routers do VAPs with the same channel, same radio, and different BSSIDs 23:06 < variable> this should not affect performance at all 23:06 < variable> if you have no idea what I'm talking about when I say "COTS", "VAP", and "BSSID" then this almost certainly applies to you :) 23:07 < variable> (I'm happy to explain it too if you're curious) 23:08 < Forst> what about the radio switching 2x/3x/4x times more to the lowest rate to transmit beacons? 23:08 < Forst> I'm now curious too :) 23:09 < variable> Forst: for a quick level-setting, do you know what the acronyms I used above are? 23:09 < Forst> virtual access point, basic service set identifier 23:09 < Forst> not sure what a COTS is tho 23:09 < variable> consumer off the shelf 23:09 < variable> least important one 23:10 < Forst> still nice to know, thanks :) 23:10 < variable> i.e., nothing I'm about to say applies to "pro" equipment 23:10 < IhrFussel> Forst, it was disabled by default and I had to enable a certain module to log accesses 23:10 < IhrFussel> But that doesn't help much now 23:11 < variable> Forst: you could imagine the 'bssid' as a MAC address of the hardware 23:11 < variable> (its actually a derivation, so it doesn't matter) 23:11 < variable> you can pretend to have multiple physical addresses, just like you can multiple "logical" addresses. 23:12 < Forst> I think I know how it works, all I wondered is whether sending more beacons for each SSID would increase overhead and such 23:12 <+catphish> sunrunner20: as long as you only have a small number, not bad at all, a silly large number will harm performance 23:12 < sunrunner20> variable, COTS? 23:12 < variable> Forst: in theory, yes it would, but I doubt the overhead is measureable 23:12 < variable> iow, strictly speaking, it is doing more work 23:12 < Forst> all I wanted to hear, thanks :) 23:12 < variable> so by definition, it is less performanct 23:12 < sunrunner20> catphish, three from the same AP. I'm about to request one be removed 23:13 < variable> but I doubt you'll be able to actually measure this :) 23:13 <+catphish> each SSID required a beacon to be sent at an interval, that beacon must be sent at low speed, which means it consumes some time to send, too many and you end up using up all the available time 23:13 <+catphish> sunrunner20: three wouldn't be a problem at all 23:13 < variable> catphish: sure, but sending two beacons at low speed instead of one shouldn't change a thing 23:13 < Forst> but you send approx 10 per second 23:14 < variable> unless the router switches to each SSID at different intervals 23:14 < Forst> two ssids makes 20 23:14 < variable> which would be damn near stupid 23:14 <+catphish> variable: it would change something, it would double the overhead, but for < 10 i wouldn't worry at all 23:14 < variable> Forst: there is a difference between 20 switches, and 10 switches of 2 packets a piece 23:14 < sunrunner20> variable, ubiqity AP. not sure which version 23:14 < lan> Forst, http://images10.newegg.com/NeweggImage/ProductImage/A0PG_1_20140424504967619.jpg 23:14 < Forst> that's a splitter, lan xD 23:14 < Forst> told ya 23:14 <+catphish> variable: what do routers have to do with it? 23:15 < variable> catphish: sorry, I meant AP, not router 23:15 <+catphish> the problem with SSIDs is purely a wireless one 23:15 < variable> I have a habbit of confusing the two 23:15 < variable> at least in text :) 23:15 <+catphish> the problem is that each SSID takes time to send its broadcast 23:15 < lan> https://www.tp-link.com/res/images/products/gallery/TD-W8951ND%28UN%296.0-03.jpg 23:16 <+catphish> it also depends if you have 802.11b enabled, if you do, the beacons have to be sent at crazy low speed 23:16 < lan> Forst, yes sorry, you were right 23:16 < Forst> the actual equipment "converting" a phone line to usual Ethernet is your tp-link 23:16 < Forst> it is a router/modem/access point combination 23:16 < variable> catphish: true 23:16 < Forst> so if it's broken, you have to get a separate modem if you want to use an Airport Express 23:17 < Forst> or perhaps settle with a different modem+router device 23:17 < Forst> beacons are sent at 1 Mbps for 2.4 and 6 Mbps for 5 GHz respectively by default 23:17 <+catphish> i just found a document, assuming beacons are sent at 1Mbps, 1 SSID consumes 3% of the available bandwidth, 10 SSIDs would consume 30% 23:17 < Forst> to maximize the distance 23:18 < Forst> * the distance which these frames can reach 23:18 <+catphish> 3 SSIDs, you'd lose 10% of your bandwidth 23:18 < Forst> I guess the better word would be "air time" 23:18 <+catphish> however, if you disable 802.11b compatibility, the beacons will send a lot faster and not be a problem 23:18 < Forst> not bandwidth 23:19 < variable> catphish: can I see document plz ? 23:19 <+catphish> variable: http://www.revolutionwifi.net/revolutionwifi/2013/10/ssid-overhead-how-many-wi-fi-ssids-are.html 23:19 < variable> ty 23:19 <+catphish> the document is discussed and linked there 23:19 < lan> Forst, cannot just connect the modem port of the splitter to the WAN port of the airport express 23:20 < Forst> lan: no, they are different ports physically and carry different types of signals 23:20 <+catphish> you can configure that spreadsheet for different configs, its cool 23:20 <+catphish> if you disable 11b then you only lose 1.6% bandwidth for 3 SSIDs 23:21 < sunrunner20> oh 23:21 < sunrunner20> I think we can disable b lol 23:21 <+catphish> if you have more than 3 SSIDs then that is essential 23:21 <+catphish> for 3, you can just about get away with it regardless 23:21 < variable> I disable 'b' but need to keep 'g' for $reasons :( 23:22 < Forst> sunrunner20: if you find where to disable it in the unifi controller, please tell me too :) 23:22 <+catphish> thats probably the sane config 23:23 < sunrunner20> Forst, I'll have a look later in the week. The AP in question I don't control 23:23 < Forst> nvm, I found it and it's disabled by default indeed 23:23 < Forst> Settings — Wireless Networks — edit Group — "Enable legacy device support (i.e. 11b)" 23:25 < lan> Forst, can you explain how I can connect my current setup to my airport express in order to substitute my tplink router then, please 23:25 < Forst> also, thank you for the link, catphish 23:25 < Forst> lan: you need to buy/get a modem, that on one end will receive a phone line connection (ADSL), and on the other end will provide an Ethernet connection 23:25 < Forst> you should better contact your ISP about that 23:29 < lan> Forst, thanks you've been very helpful 23:29 < Forst> lan: you're welcome :) 23:29 <+catphish> SporkWitch: lol did you get yourself banned from ##linux 23:30 < SporkWitch> happens when one of the regular trolls whinges and disrupts the channel; why remove the disruption when you can remove someone that actually contributes? 23:31 < SporkWitch> why, one of the trolls celebrating ? lol 23:32 <+catphish> SporkWitch: this just happened to me, i have no idea why: https://paste.ubuntu.com/p/NN8RY5WxgS/ 23:32 <+catphish> i assume it relates to my comment last night 23:33 < SporkWitch> sounds about right 23:33 < SporkWitch> li's a dedicated troll; they actively encourage them the last few years 23:35 <+catphish> dumped it into their ops channel, i don't really have much faith in that channel :( 23:35 < SporkWitch> you shouldn't 23:35 < SporkWitch> one of the things that said last night is telling: it's apparently no longer a support channel but a "lounge" 23:35 <+catphish> i don't think that's true, given their strict rules 23:36 <+catphish> you can't really have a social channel with strict rules 23:36 < SporkWitch> if the ircops weren't just as bad these days i'd see if it were possible to get the channel taken from them; last i heard freenode IS supposed to be, first and foremost, support for FOSS software and projects, always has been 23:37 <+catphish> but sometimes i have to realise that everyone annoys people sometimes 23:37 <+catphish> i mean, i clearly annoyed the folks in ##linux last night, and you're not exactly nice to everyone around here either 23:38 < SporkWitch> ask stupid questions get stupid answers; ask google questions, get google answers. If someone wants everything done and handed to them, they can pay for it. 23:38 <+catphish> gotta find a balance i guess, i like to help people when i can 23:38 <+catphish> SporkWitch: on that i always disagree 23:38 < SporkWitch> just because it's september doesn't mean we have to lower our standards 23:39 <+catphish> i'm here to help people, for free, i will do do as best i can 23:39 <+catphish> it's literally not september 23:39 <+catphish> in fact, it's not even close 23:39 < SporkWitch> it's always september 23:39 < SporkWitch> it's been september for almost three decades 23:40 < SporkWitch> and you're not helping them by handing things to them; you are, in fact, actively harming them 23:40 <+catphish> well you're entitled to that opinion 23:40 < SporkWitch> it's not an opinion, it's demonstrable 23:41 < SporkWitch> the more they've encouraged it, the more you see people that can't do anything for themselves, even when it IS handed to them 23:41 <+catphish> i find an answer and an explanation goes a long way to helping people learn 23:41 < SporkWitch> you see it in here too, with that one kid (i'd know his name if i saw it; i tend to braindump names once they're no longer talking), constantly asking homework questions and arguing with every answer provided 23:41 <+catphish> the second time, perhaps only the explanation :) 23:42 <+catphish> that's ok 23:42 <+catphish> asking questions and arguing with the answers is how i learn 23:42 <+catphish> i wish more people who knew more than me tolerated it :) 23:42 < SporkWitch> catphish: there's a difference between the socratic method and "nuh uh" 23:42 <+catphish> lol true 23:43 <+catphish> never knew socratic method was a thing, cool 23:43 < SporkWitch> want an example of good questions, look at that guy last night messing with VPNs 23:44 <+catphish> i struggled to follow that, then got drunk and went to sleep instead 23:44 < SporkWitch> he did his research, he asked good questions in response to the resources he was directed to and the answers he was given, and with a little bit of prodding he could be made to figure things out himself 23:44 < SporkWitch> it was actually a VERY good discussion, and i think he got a lot from it 23:44 < SporkWitch> even if one of the others and i scared him a bit by going pretty deep on theory between each other lol; had to back up and remind him he could ignore most of what we were talking about lol 23:46 < karolin> hi i like this http://www.thedubber.altervista.org/ip/ 23:47 <+catphish> i'm trying to learn how iscsi works, not been able to get much help there, so just reading the overcomplicated documentation :) 23:48 <+catphish> karolin: why u share this? 23:50 < SporkWitch> catphish: usually what you've gotta do when asking a broad question about a low-level topic; that said, when one DOES read that documentation and you have at least the foundational knowledge needed, it'll generate productive questions for ##hardware 23:51 < SporkWitch> forgot who linked it a few weeks ago, but i've been loving that essay on how to ask smart questions; 30+ years of basic etiquette condensed into a 15 minute read 23:52 <+catphish> the problem is, sometimes there just aren't enough people in the world with the knowledge you seek :) 23:52 < SporkWitch> also true, especially the lower level you go 23:53 <+catphish> unless you want to do os development, in which case you can go as low and technical as you like and the geniuses in #osdev will always give you the answer :) 23:54 <+catphish> welcome back 23:55 < SporkWitch> catphish: it's not exactly the kind of place likely to get truly bad questions; if you're looking into things on that level presumably you already have a foundation 23:55 < SporkWitch> gotta love netsplits 23:55 <+catphish> SporkWitch: indeed, they're better than most at assuming competence 23:55 <+catphish> i geuss they get less annoying newbies, or they just have the tolerance of saints 23:55 <+catphish> in any case, great channel 23:56 < SporkWitch> the former; the kinds you get in ##networking, ##linux, and ##security don't find places like that 23:56 < SporkWitch> we'd get less of it too if people would actually drive home etiquette and standards. 23:57 < SporkWitch> hell, i'm sorely tempted to link that "how to ask smart questions" essay in the video game discord i admin lol 23:57 <+catphish> there are other channels that really are secret where you don't dare ask stupid questions because there are genuine experts :) 23:57 < SporkWitch> half the questions we see are literally the first google hit for their exact phrase --- Log closed Mon May 07 00:00:11 2018