--- Log opened Fri Jun 08 00:00:49 2018 00:05 < paulo_> thanks for the advice catphish, i'll try in on the weekend 00:06 < Apachez> drudge`: Please enter root-password: 00:06 <+catphish> good luck 00:25 < drudge`> t00m4nys3cr3tz!! 00:25 < drudge`> ;p 01:04 < atsu> . 01:32 < ALowther> Is the maximum distance ethernet cables are rated for based upon the maximum distance it can travel while still reliably passing the correct signal along?...Is this why newer, higher, rated cables seem to support shorting lengths; because the frequency used within the wiring can't travel as far as lower frequencies while still remaining reliable? 01:32 < ALowther> shorter lengths* 01:32 < ALowther> shorter maximum lengths* 01:32 < linux_probe> cable has a limited amount of bandwidth 01:34 < linux_probe> TPI, aka TWISTS PER INCH" means a ton 01:34 < linux_probe> as well as insulation and individiual wire jacketing 01:34 < djph> ALowther: er, no? 01:34 < ALowther> Those are put into place to combat/negate interference, right? 01:34 < djph> er, no? 01:35 < linux_probe> they factoir in actual electrical theory 01:35 < ALowther> djph: I'm not sure if you're trolling or not. 01:35 < djph> the original rating was because of signal propogation over thinnet/thicknet 01:35 < djph> it stuck with UTP 01:36 < linux_probe> nothign wroing withUTP, if it has a high enough TPI and not against other cabling or anything that induces intereference 01:37 < linux_probe> ;) 01:37 < djph> and also fast-ethernet (min cat5), gige (min cat5e), 10g (min cat6 - 50m; cat6a - 100m) 01:38 < linux_probe> life induces interference 01:38 < linux_probe> :)) 01:38 < djph> using cat6(a) in new installation is mainly to future-proof 01:38 < linux_probe> id s djph'sfutur e 3 years? 01:38 < VincentHoshino> using singlemode fiber is? 01:39 < linux_probe> fuckitall, install conduit large enough to pull NEW cabling/fiber 01:39 < djph> SM fibre will definitely combat interference :) (but again, mainly for future-proof) 01:39 < linux_probe> think you need conduit for 3 cables or x diameter?, instal it larger diameter to hold 6x cable oif 3x diameter 01:39 < linux_probe> future proofing 01:40 < linux_probe> REAL futur proofing 01:40 < linux_probe> then again, chinesium junk conduit/glues 01:40 < linux_probe> >_> dont bother 01:41 < linux_probe> may as well have it look like india basket case massive knots of cabling with no bandwidth 01:41 < linux_probe> :))) 01:56 < redrabbit> Anybody having glitches with he.com ipv6 tunnel? 01:57 < redrabbit> The gateway is timed out 02:08 < djph> dont' use it, sorry 02:09 < over9kturtles> hey guys I am interested in finding a router that is patched against VPNFilter 02:09 < over9kturtles> but from my research it seems like even DDWRT won't help 02:10 < over9kturtles> It appears to target the router at the Common Firmware Environment (CFE) level and leverage Busybox to write the “stage-one” code to NVRAM. The CFE loads as part of the boot process DD-WRT so all of this happen before DD-WRT is even running. 02:12 < mgolisch> how can it install itself? 02:12 < mgolisch> no routers will allow anonymous access that would allow to manipulate files on its storage devices 02:13 < djph> ^ also, firewall the shit outta your stufff 02:14 < over9kturtles> I don't know it appears to be a worm or something 02:14 < over9kturtles> cisco talos labs has confirmed over 500k infections 02:14 < djph> although, isn't "don't be a fucking moron and allow default-credentials on the network" most of the fix? 02:14 < over9kturtles> https://blog.talosintelligence.com/2018/06/vpnfilter-update.html 02:14 < over9kturtles> seems to not matter if you change default credentials or not 02:15 < over9kturtles> Even if you install DDWRT It appears to target the router at the Common Firmware Environment (CFE) level and leverage Busybox to write the “stage-one” code to NVRAM. The CFE loads as part of the boot process DD-WRT so all of this happen before DD-WRT is even running. 02:15 < mgolisch> how does it do that 02:16 < djph> where's that, since the article says nothing to that effect 02:20 < djph> everything I can find all points to "it uses default credentials for the kit ... " 02:20 < over9kturtles> https://blog.talosintelligence.com/2018/05/VPNFilter.html 02:20 < over9kturtles> goes into more detail 02:24 < djph> still doesn't say "it can get around non-default credentials / a good password / etc." 02:27 < over9kturtles> they don't know the attack vector at the moment 02:27 * djph bets it's default admin credentials ... 02:37 < mgolisch> my router runs centos on amd64 02:37 < mgolisch> iam sure its not affected 02:54 < acos> Howdy 03:44 < adhocadhoc> anyone here a TPM dealing with datacenters and specifically DWDM/dark fiber? 04:52 < spaces> linux_probe yo! 06:14 < Goop> Who here has experience with making their own yagi antenna? 06:17 < light> I made a yoda antena once but the packets arrived out of order 06:18 < Goop> light, lol. 06:24 < Mead> Shouldn't be a problem if your layer 5 is working 06:51 < dminuoso> In networking lingo, what do you call the act of "connecting two pieces of hardware with a fiber optic cable"? 06:52 < dminuoso> "coupling", "patching", "wiring", "connection/connexion"? 06:52 < dminuoso> Something else? 06:52 < Poster> crossover probably 06:53 < Poster> plugging TX of one into RX of the other and vice versa 06:55 < VincentHoshino> linking? 06:55 < rewt> magic 06:56 < Poster> I guess I was thinking of ethernet, it may be different if you're connecting up a storage system 06:56 < VincentHoshino> the real magic starts when you connect 2 switches 07:06 <+pppingme> Wait till the first time you connect two routers! 07:09 < Pretheist> What do the prefixes on network DNS names mean? For example, be-7922-ar01.saltlakecity.ut.utah.comcast.net 07:09 < Pretheist> What do the "be" and "ar" mean? 07:11 < dminuoso> VincentHoshino: Do you call it "linking" ? 07:11 < dminuoso> In our company "patching" has been established, just curious whether there was any de-facto standard 07:12 < VincentHoshino> not sure there is one 07:24 < meingtsla> Pretheist: "be" could stand for "bundle-ether", which is where multiple links are grouped together to form one logical link. "ar" could be a particular type of router in Comcast's network. 07:25 < grawity> "ar" would be ... Arista? 07:25 < Pretheist> meingtsla: Thank you. Where would I learn about different types of link aggregation, etc? 07:29 < meingtsla> grawity: Hmm..... Possibly but then doesn't Arista refer to their bundles as port-channels? (Admittedly though I haven't worked with Arista.) 07:31 < meingtsla> Pretheist: There is https://en.wikipedia.org/wiki/Link_aggregation for a high-level overview. There may be better resources out there that aren't coming to mind at the moment 07:31 < Pretheist> I wish everyone was poor, so we could all collectively demand good, free resources for learning this stuff. 07:35 < VincentHoshino> I'm sure Cisco has some tutorials/youtubevids for this kind of stuff 07:35 < Pretheist> I'll have to look into it. 07:36 < Pretheist> How do coffee shops and similar institutions with free wifi usually keep people from tinkering with their equipment? Does client isolation prevent MITM, and then some sort of "ethernet only" vlanning protects the http config interface? 07:42 < Emperorpenguin> Pretheist: decent network gear have out of band management that's unreachable from the traffic that goes through them 07:42 < Emperorpenguin> Or, yes, just put the management ip on another vlan 07:43 < Pretheist> Emperorpenguin: from looking at the setup, it's just some cheap ARRIS cable modem that comcast puts in most houses. Do those really have VLAN intelligence? Or perhaps it's just in AP mode, and I'm an idiot. 07:45 < Emperorpenguin> What setup 07:45 < Emperorpenguin> Where 07:45 < Emperorpenguin> From what point of view 07:45 < Emperorpenguin> Or perhaps you're in a small place that just bought an internet link and set it open and does not care about security 07:46 < Emperorpenguin> I don't get why you need free WiFi when you can have 30 GB/month cellular data for peanuts 07:51 < Pretheist> Emperorpenguin: their network gear that literally just consists of what looks like a home link. I just wasn't aware you could easily configure these properly, but I don't know how it links into their captive-portal "cloudwifi" solution, either, so I was just curious. Sorry if it's irritating to ask like this; I don't know how else to, but I'm still too curious to remain silent. 07:51 < Emperorpenguin> Ahh sure don't worry 07:53 < Emperorpenguin> I don't know, businessumer public access management is a weird world 07:53 < Emperorpenguin> Could be done in so many ways 07:54 < Emperorpenguin> Creative networking is fun but gets back at you down the line 07:55 < Pretheist> Makes sense. I really need to start carrying around more network adapters. Hmm. 07:55 < Emperorpenguin> Such as? 07:56 < Emperorpenguin> Doubt they'll let you plug your serial cable into their router 07:56 < Pretheist> Emperorpenguin: Just wireless stuff. It's easier to fingerprint by WPS manufacturer info, for example 08:17 < CuriosTiger> Emperorpenguin: From pentest work, you'd be surprised how often there's nobody to stop you. 08:20 < Emperorpenguin> Oh yeah I know 09:35 < linux_probe> https://www.techrepublic.com/article/security-pros-beware-vpnfilter-malware-is-more-dangerous-than-first-thought 09:49 < regdude> it wouldn't be such a problem if people would upgrade 10:01 < myrat> hi 10:13 < pax_rhos> hello 10:14 < pax_rhos> how does 'NS' record work in DNS? 10:14 < pax_rhos> do I need to have additional NS record for a sub-domain? 10:14 < pax_rhos> or is it not necessary? 10:16 <@xand> pax_rhos: you have NS records to point sub-domains at other NS servers 10:17 < pax_rhos> okay, thanks, that's what I thought 10:19 < regdude> what are point-to-point links in RSTP? What makes them so special in RSTP setups? 10:22 < drathir> mornn/evenin... 10:26 < FatalFUUU> Nortel 5520-48T-PWR - 48 port full gigabit, full PoE (af only, not at) - but really cheap - any particular reason? 10:50 < Atro> its nortel 11:00 < endre> NOrtel 11:01 < pyro_> what is the command to send a request using curl 11:01 < endre> curl google.com 11:02 <@xand> man curl 11:18 < meowschwitz> eh 11:19 <@xand> same to you too 11:19 < meowschwitz> can 802.11 wifi frames carry vlan tag information? 11:21 < djph> I've not seen it myself (usually the AP does tagging / untagging); although I don't see why you COULDN'T have an AP not handle tagging 11:24 < ilikebeer> hi 11:24 < ilikebeer> i like beer 11:25 < potatoe> ilikebeer #homebrew 11:25 < potatoe> oh 11:25 < meowschwitz> i'm trying to figure out what is it exactly that mikrotik's wifi is doing with vlan tags 11:25 < regdude> you mean actual hardware frames or simply 802.11 packets? 11:25 < meowschwitz> regdude: in principle if it is possible to carry tagged traffic over wireless 11:26 < regdude> you probably mean Ethernet frames that are being sent over wifi, in that case yes, you can carry VLAN tags as long as MTU (the hardwre MTU) is capable of forwarding such long packets 11:26 < regdude> that is a very common setup for MikroTik, sometimes called wireless trunk ports 11:27 < regdude> here is even a configuration made that shows it is possible: https://wiki.mikrotik.com/wiki/Manual:Wireless_VLAN_Trunk 11:27 < meowschwitz> regdude: I'm actually trying to bridge the wifi interface into a tagged vlan on ether1, I must be missing something 11:28 < meowschwitz> regdude: my question about carrying tags over wifi was to exclude the possibility I misunderstand the wifi side of the configuration 11:28 < regdude> well don't add VLAN interfaces to a bridge, that will cause you issues 11:28 < regdude> use the provided link, there you will see how to use bridge VLAN filtering, which is much more suitable 11:30 < regdude> simply skip any tagging actions on the WLAN interface, let the bridge handle tags for you 11:30 < meowschwitz> brilliant, i'll try this, thanks 12:09 < meowschwitz> regdude: I did everything right *except* I forgot to set PVID on the wifi interface 12:09 < meowschwitz> it works, thanks for your help 12:10 < regdude> that can be skipped, it is more for security reasons, theoretically someone from the other side is able to access the device, but if you are running a PtP link for a WISP or something, then it might not be a large issue, though always add more security layers as possible 12:11 < meowschwitz> I'm not, all I was trying to do is bridge a tagged vlan from ether1 side to untagged wlan1 side 12:12 < meowschwitz> I'm not actually bridging segments, just replacing crap tplink CPE with microtiks 12:15 < regdude> if it is for home environment, then it isn't a big deal, but still, Firewall, disabled services and access limited from certain IPs should be set 12:17 < meowschwitz> regdude: it's a vlan that goes straight to pfsense which only routes traffic to the WAN and cuts off everything else 12:18 < meowschwitz> i treat all wifi devices as untrustworthy so they dont get any access to internal office services 12:20 < regdude> what about someone trying to access the wifi device? It is up to you, pfsense will deal with security, but like I mentioned before, security should be in layers 12:20 < meowschwitz> regdude: the management vlan is a separate interface not reachable from wifi 12:20 < regdude> for some reasons I take very seriously the ability to access the CPU from VLAN 12:22 < meowschwitz> i should however turn off the weird proprietary management magic microtiks have 12:22 < regdude> at least turn off mac-server and winbox, apart from all regular services 12:22 < meowschwitz> yes 12:25 < meowschwitz> regdude: you are right, but I am organizing this setup as a transparent bridge, vlan 123 -> wifi, access to the router itself is over management vlan which is highly restricted 12:45 < Li> I'm wondering before purchasing this range extender, whether do I need to keep hooked to ethernet or only one 1 time setup!? Netgear EX2700 Ripetitore WiFi, Range Extender 12:45 < Li> not sure how range extenders work 12:51 < Atro> they're shit 12:51 < djph> ^ 12:52 < djph> if it's a standalone AP that you can plug into your wired network, then it'll be fine. 12:52 < Atro> Li, use an AP 12:52 < djph> (well, other than "netgear") 12:52 < djph> if it's just a repeater (i.e. re-broadcasts a radio signal), ehhh ... bad news usually 12:53 < dogbert_2> hey djph 12:54 < djph> how goes dogbert_2 12:54 < TandyUK> [11:45]
  • not sure how range extenders work << Badly imho 12:54 < djph> heyo TandyUK 12:54 < TandyUK> +1000 for "run a cable between the 2 locations, and install a second access point, properly configured so that both new and old AP are part of the same wifi network" 12:55 < dogbert_2> just ripping some DVD's :) 12:56 < regdude> he left before we could break it all down for him 12:56 < TandyUK> oh lol 12:56 < regdude> I guess it broke his wifi 12:56 < TandyUK> yeah probably lol 12:57 * meowschwitz rages at the mention of netgear 12:57 < meowschwitz> the "DHTML" age is officially over everywhere 12:57 < meowschwitz> except, apparently, at Netgear R&D 12:58 < TandyUK> its all their devs know how to write 12:58 < TandyUK> along wiht tables instead of divs (not sure if i mean the html tag, or another word for their devs there :P) 13:00 <+catphish> hey cool, HE seem to finally have London tunnel relays 13:01 <@xand> didn't they before 13:02 < TandyUK> they used to, but im going back like 8 years 13:02 <@xand> yeah I thought they did 13:06 < dogbert_2> I could have passed my CISSP, but I got high :P 13:06 < TandyUK> CISSP? 13:06 < turtle> crazy insane salty sausage party 13:06 < TandyUK> Im doing a Yealink CIPPE course atm (Certified IP Phone Engineer) 13:06 < regdude> why would someone get high over that 13:06 < dogbert_2> I was gonna call a truce with trump but then I got high. -kim jong un (LOLZ) 13:07 < TandyUK> potentially one of the first in the UK (if i pass) lol 13:07 < grawity> meowschwitz: wait, what's "DHTML" anyways? I thought it was just referring to the same DOM manipulations as done nowadays 13:56 < CoolerZ> hey 13:56 < CoolerZ> what does telnet do when i type o www.google.com 13:56 < CoolerZ> in the telnet console 13:57 < CoolerZ> is there a protocol or does it just establish a tcp connection to port 23? 13:58 < CoolerZ> because every time i try it just fails 13:58 < djph> it tries to open a telnet session to google.com 13:58 < CoolerZ> so is there a particular protocol that runs on top of TCP? like http 13:58 < detha> there is a protocol, see rfc854 13:59 < CoolerZ> ok 13:59 < CoolerZ> well i have a different question 13:59 < CoolerZ> i want to implement a socks server in nodejs 13:59 < regdude> you can connect to port 80 and make GET requests manually 13:59 < CoolerZ> should i look at the rfc for socks5 ? 14:00 < CoolerZ> regdude, well o www.google.com 80 also fails 14:00 < regdude> google doesn't want you to be unsecured 14:00 < qman__> with telnet, you open the ocnnection, then GET / 14:00 < qman__> it will respond with a 301 redirect to https 14:02 < CoolerZ> o www.google.com 443GET / 14:02 < CoolerZ> just causes Press any key to continue... to display 14:02 < qman__> on 80 14:02 < qman__> 443 won't work because it expects a TLS handshake first 14:03 < CoolerZ> oh ok 14:03 < CoolerZ> ok it works 14:04 < regdude> google actually didn't redirect 14:04 < CoolerZ> how hard is it to implement a socks5 proxy server in nodejs? 14:04 < CoolerZ> i couldn't find any modules that did this, all that socks modules are for socks clients 14:05 < CoolerZ> all i found was this https://medium.com/@patrickackerman/building-a-socks-proxy-with-node-js-part-2-dd92127d7fbd 14:07 < CoolerZ> ok i found one https://github.com/mscdex/socksv5 14:18 < CoolerZ> how can i test a socks server? 14:18 < CoolerZ> running locally? 14:22 <@xand> try to use it 14:59 < networking> hi 14:59 < networking> need some non-technical professional advice 15:00 < lupine> not from the internet, you don't :/ 15:01 < regdude> specialists will probably google an advice eitherway 15:01 < networking> how usual it is to record a skype video call during interview? 15:01 < networking> they have not informed me initially it is being recorded 15:01 < lupine> well, that would be illegal 15:01 < lupine> in .uk anyway 15:02 < regdude> not sure if the law applies to Skype, for phone calls yes 15:02 < lupine> I presume it's a free-for-all in .us, since everything else is 15:03 < networking> I asked to disconnect after knowing it is being recorded but not sure how usual it is 15:03 < lupine> personally, I'd fail at the first hurdle at such a company. I don't have skype :D 15:04 < networking> lupine: me too, I had to create for the interview :D 15:04 < regdude> google is the best specialist, trust the Internet: https://www.avvo.com/legal-answers/he-recorded-me-on-skype-without-permission-and-is--1675692.html 15:05 < networking> regdude: checking 15:06 < CoolerZ> hello? anyone familiar with socks5 ? 15:06 < compdoc> does that still exist? 15:06 < CoolerZ> firefox doesn't seem to follow the socks5 protocol 15:06 < networking> that seems to be a harassing etc but this was an official interview and they mentioned it's their policy or something like that, still the same law applies? 15:06 < CoolerZ> its sending my socks server this line CONNECT www.npmjs.com:443 HTTP/1.1 15:07 < CoolerZ> which is the http protocol headers 15:07 < likcoras> CoolerZ: to test socks5? just try using it with curl and see if works/what kinds of errors it spews. 15:07 < CoolerZ> instead of the socks5 headers 15:07 < CoolerZ> likcoras, no i am saying firefox is doing something weird 15:07 < CoolerZ> its sending me http headers instead of socks5 headers 15:08 < CoolerZ> and then in the browser it displays 'The proxy server is refusing connections' 15:08 < CoolerZ> because my server refuses the http headers 15:08 < CoolerZ> why is firefox doing this? 15:08 < likcoras> Are you sure you've set it as SOCKS and not just a http proxy? 15:09 < ||cw> CoolerZ: it's probably more productive to ask firefox's support/community 15:09 < CoolerZ> likcoras, https://imgur.com/l6H3aGf 15:09 < CoolerZ> ||cw, is there a firefox channel/ 15:10 < ||cw> /msg alis and see 15:10 < likcoras> CoolerZ: uncheck the "use this protocol for.." 15:10 < likcoras> and clear all lines except for socks. 15:10 <+catphish> networking: it's very country specific 15:10 < CoolerZ> likcoras, why? 15:10 <+catphish> recording is quite common in some places without consent, but illegal in other places 15:11 < networking> catphish: ok 15:11 < likcoras> catphish: otherwise it uses the given host as an http proxy instead of SOCKS. 15:11 < likcoras> CoolerZ: * 15:11 < CoolerZ> likcoras, oh wait, is http proxy a different thing? 15:11 < CoolerZ> ok i see 15:11 < likcoras> Yup. That's the CONNECT thing you're seeing. 15:12 < ||cw> networking: even in the US it's state law specific 15:12 <+catphish> networking: my attitude is that if i send someone any data, i expect them to hang onto it 15:12 <+catphish> although now in Europe GDPR puts a LOT of limits on this 15:13 < networking> ||cw: ok 15:13 < ||cw> I know in MO that only one party needs to know that it's being recorded. so you can record someone you're participating in without telling everyone, but you can't record someone else's with informing them 15:13 < networking> catphish: you mean like not sending it others etc and keeping it to themseleves? 15:13 <+catphish> networking: yes 15:14 < CoolerZ> likcoras, thanks 15:14 < networking> catphish: ok, I am not sure that will happen, data leaks 15:15 < ||cw> yeah, you still can't publish or share it with 3rd parties without permission in the US. US law isn't as strong as GPDR, but the basics are there for civil lawsuits when data is misused 15:19 < dunnousername> Hey, I was wondering if PoE is reasonable to use for cheap/home stuff; if I can avoid getting 5 power adapters, it makes sense, but it seems like PoE is expensive... right? 15:20 < dminuoso> dunnousername: PoE is fine, and the switches are reasonably prices. 15:20 < lupine> it's quite good in some home environments since it means less need to run cables 15:20 < redrabbit> 216.66.84.42 down for you ? 15:20 < lupine> price per unit matters much less at low scale 15:20 < redrabbit> Anybody having glitches with he.com ipv6 tunnel? 15:20 < dminuoso> We even use it in our office. :) 15:20 < compdoc> they make 8 port poe switches that dont cost a lot 15:20 < redrabbit> The gateway is timed out 15:21 < dminuoso> Our entire phone infrastructure uses PoE. 15:21 < dunnousername> Do switches normally inject PoE, or do they just switch it? 15:22 < compdoc> opu cant pass poe thru a normal switch 15:22 < compdoc> you 15:22 < dunnousername> I mean specifically PoE switches 15:22 < dunnousername> do I need to buy an injector? 15:22 < dminuoso> dunnousername: Just be sure not to skim on the hardware. I've experienced some non-spec conform hardware that can be quite sensitive. 15:23 < dminuoso> dunnousername: We once had a PoE switch that burned out because we hot-unplugged a camera. 15:23 < dminuoso> That was downright amazing. 15:24 < CoolerZ> likcoras, what was the other way to test a socks server? 15:24 < likcoras> use curl 15:24 < dminuoso> dunnousername: it depends 15:24 < dminuoso> dunnousername: you can use midspan (injectors) or endspan (PoE capable switches) 15:25 < dunnousername> those are types of switches? 15:25 < likcoras> curl --socks-5-* options 15:25 < CoolerZ> command? 15:25 < dminuoso> dunnousername: the former is usually a hub 15:25 < dminuoso> dunnousername: How many PoE ports do you need? 15:26 < dunnousername> probably at most 5 15:26 < likcoras> CoolerZ: I recommend the taking a look at the curl manpage, there are a lot of options concerning eg. debug output that can help a lot when debugging network issues. 15:26 < regdude> dunnousername: I use PoE everywhere, but all my devices support it. Some cheap PoE switches can detect a false standard and start powering up when they shouldn't, but if you use the same vendor devices, then the risk is quite low 15:27 < regdude> most switches should have an option to manually set which ports is powered and which is not 15:28 < dminuoso> dunnousername: Just a random example to show you what I mean: https://www.zyxel.com/de/de/products_services/8-10-16-24-48-port-GbE-Smart-Managed-Switch-GS1900-Series/ 15:28 < dminuoso> dunnousername: Im in no way suggesting you should purchase that particular device. It just acts as an example. 15:29 < dunnousername> I think I understand, I gtg now though. I'll come back if I have m9re questions 15:29 < CoolerZ> likcoras, well i tried --verbose and curl is saying connection timed out 15:30 < CoolerZ> i can ping the domain though 15:30 < CoolerZ> is there a way to check a specific port is open on that domain? 15:30 < likcoras> CoolerZ: full output? 15:30 < CoolerZ> check if* 15:30 < likcoras> if tcp, I guess something like nc -v $ip $port 15:31 < redrabbit> nmap 15:31 < redrabbit> so, anyone having issues with he.com ipv6 tunnel 15:32 < CoolerZ> likcoras, https://paste.pound-python.org/raw/gw2WiSvAQzWRKzm2gBM7/ 15:33 < qoxncyha> switches operate on MAC frames, right? 15:34 < regdude> switches check the MAC-DST address and forward to the port that has received a packet with such MAC-SRC 15:34 < regdude> unless it is a dumb switch (hub) that floods everything to everywhere 15:34 < qoxncyha> was what i said wrong? is there any reason you rephrased what i said? 15:34 < CoolerZ> PORT STATE SERVICE 15:34 < CoolerZ> 44649/tcp filtered unknown 15:34 < CoolerZ> using nmap 15:35 < CoolerZ> Host is up (0.13s latency) 15:35 < regdude> it is not incorrect, but a bit incomplete, a switch does a very specific function 15:35 < qoxncyha> it's a router that operates over MAC, right? 15:35 < qoxncyha> 'router' 15:35 < likcoras> CoolerZ: forward ports / open that port on the firewall on the host running the SOCKS proxy. 15:36 < regdude> no, router operates over IP if you like to classify things that way 15:36 < qoxncyha> regdude: thanks 15:36 < qoxncyha> is a switch a router that operates over MAC? 15:36 < CoolerZ> i think the server behind a reverse proxy and 44649 is probably not the port that is exposed to the public 15:36 < qoxncyha> is a switch a 'router' that operates over MAC? 15:36 < baitshell> Switch L2, Routers L3 15:36 < CoolerZ> i think the public port is 80 or 443 15:36 < regdude> how did you come up with that assumptions now 15:36 < qoxncyha> can i just get a yes or no answer? that would be great 15:36 < regdude> switch = mac, router = ip 15:37 < baitshell> correct 15:37 < CoolerZ> yup nmap says 80 is open 15:37 < qoxncyha> you're only confusing people by changing the subject from their question 15:37 < regdude> a switch is not a router if it operated over MAC 15:37 < qoxncyha> does that make sense? 15:37 < CoolerZ> and so is 443 15:37 < likcoras> CoolerZ: might just be an http(s) server and not actually a SOCKS proxy. 15:37 < regdude> I think we are not supposed to be telling the right answers to tests 15:37 < qoxncyha> someone in the office is talking about switches and i want to make sure i understand 15:38 < CoolerZ> * Received invalid version in initial SOCKS5 response. 15:38 < CoolerZ> * Closing connection 0 15:38 < CoolerZ> curl: (7) Received invalid version in initial SOCKS5 response. 15:38 < qoxncyha> which it seems like i do, but everyone in here wants to add some gem of knowledge that's tangential to the question 15:38 < CoolerZ> likcoras, how do i get curl to print even more elaborate debug messages? 15:39 < qoxncyha> one more time: is a switch basically a 'router' that operates over MAC instead of IP? 15:39 < qoxncyha> yes or no, if possible 15:39 < likcoras> CoolerZ: eh, that's pretty much it. I'm betting that the host you're trying to use as a proxy isn't running a SOCKS proxy on ports 443 or 80. 15:39 < likcoras> In this case. 15:39 < baitshell> no 15:39 < qoxncyha> baitshell: what part is wrong? 15:39 < CoolerZ> likcoras, well its a repl.it nodejs server that i made 15:40 < CoolerZ> likcoras, https://repl.it/repls/TautLongtermGoals 15:40 < regdude> baitshell: if you think that a switch looks up into hosts table to find the destination similarly to IP routing decision on routing table, then you could call it that way 15:40 < regdude> but none should every call it like that 15:40 < qoxncyha> was that intended for me? 15:41 < baitshell> because it's basic thing and every termin has it's own meaning 15:41 < regdude> no, my gems are worthless 15:41 < qoxncyha> baitshell: thanks, that's really helpful 15:41 < likcoras> CoolerZ: I guess check the repl.it docs/support. Probably a problem on their end. 15:41 < baitshell> surely some switches do L3 jobs 15:42 < baitshell> like a router but it's different sory 15:42 < regdude> actually many managed switches these days are capable of routing 15:42 < baitshell> *story 15:42 < qoxncyha> that's very smart 15:42 < qoxncyha> thanks for the wisdom 15:42 < qoxncyha> no i'm wrong, but then 'exactly what i said' 15:43 < qoxncyha> with the additional wisdom of "switches operate over L3 as well" 15:43 < likcoras> CoolerZ: from what I can see, they only do HTTP(s maybe), and allowing people to run arbitrary services on arbitrary ports wouldn't be too doable without jumping through a log of hoops on their end. 15:43 < qoxncyha> which is *not* my question. does that make sense? 15:43 < redrabbit> well, ssems like he.com ipv6 tunnel is back after half a day of downtime 15:43 < CoolerZ> likcoras, no thats fine if its only allowing port 80 and 443 15:43 < CoolerZ> but why is curl reporting invalid socks version number 15:43 < regdude> qoxncyha: you do realize that most people here are at least engineers? 15:43 < qoxncyha> this is frustrating. let me come back later. 15:44 < redrabbit> maybe someone from he reads here lol 15:44 < likcoras> That's not the issue here. I'm only guessing, but they probably route client requests to the correct repl instance by looking at the HOST header. 15:44 < qoxncyha> regdude: you act like you've never talked to a person before 15:44 < likcoras> And that only works for http. 15:44 < detha> qoxncyha: I would say that the only possible answer to your question stated like you did is "Well, it's complicated" 15:45 < qoxncyha> detha: thank you, that helps 15:45 < detha> (or just 'no') 15:45 < qoxncyha> detha: in that case, is a switch's usual purpose to route MAC frames? 15:46 < baitshell> no 15:46 < detha> no 15:46 < baitshell> Switch do switching on l2 15:46 < regdude> lol 15:46 < baitshell> no routes 15:46 < detha> Semantics, but in networking the word 'route' has a specific meaning 15:46 < qoxncyha> okay, i used the wrong term 15:46 < CoolerZ> likcoras, oh 15:46 < qoxncyha> is a switch's usual purpose to 'switch' MAC frames? 15:46 < baitshell> correct 15:46 < CoolerZ> likcoras, could i set up a http proxy then? 15:46 < detha> It is to forward MAC frames yes 15:46 < Kartagis> hi 15:47 < qoxncyha> by 'switch', i mean 'send MAC frames from source to destination' 15:47 < qoxncyha> is that correct? 15:47 < likcoras> Possibly? If they allow the 'CONNECT' method on their servers. 15:47 < likcoras> I would check their docs. 15:47 < Kartagis> why can't I create an A record 'admin' ? 15:47 < baitshell> correct 15:47 < likcoras> But it's very possible they haven't enabled this, due to obvious reasons. 15:47 < Kartagis> is that reserved? 15:48 < skyroveRR> Kartagis: admin what? 15:48 < detha> admin password 15:48 < skyroveRR> admin 123 15:48 < regdude> I think he is talking about DNS records 15:48 < skyroveRR> We know. 15:48 < Kartagis> A record, as I just said 15:48 < qoxncyha> okay. routers 'route' IP packets, not MAC frames, between connected devices and potentially remap IP space, correct? 15:48 < skyroveRR> Kartagis: again, admin what? 15:49 < likcoras> Kartagis: you sure it isn't just whatever service you're using having reserved it for themselves? 15:49 < Kartagis> admin.foo.example.net 15:49 < skyroveRR> Kartagis: an 'A' record points to an IP. 15:49 < likcoras> It's not reserved, as far as I'm aware. 15:49 < regdude> that is a weird conversation going on over there, not a test 15:49 < skyroveRR> Kartagis: you need the full FQDN. 15:49 < likcoras> NO reason it shouldn't be valid. 15:49 < Kartagis> likcoras: it can't be resolved 15:49 < lupine> configuration languages vary 15:50 < lupine> ISTR it's normal to put the label only into bind zonefiles for instance 15:50 < detha> Kartagis: when did you create it? 15:50 < CoolerZ> https://repl.it/site/docs/http-servers 15:50 < Kartagis> detha: 5 minutes ago, and the other one I created 5 minutes ago was propagated 15:51 < qoxncyha> routers 'route' IP packets, not MAC frames, between connected devices and potentially remap IP space, correct? 15:51 < detha> did you try resolve it before you created it? In that case, you may be hitting negative TTL in some cache 15:51 < qoxncyha> why is it so hard to ask a simple yes/no question? 15:51 < detha> "It's complicated" 15:51 < Andrew_0010bit> "Better luck next time." 15:51 < qoxncyha> it's complicated, got it 15:51 < qoxncyha> Andrew_0010bit: thanks 15:52 < Andrew_0010bit> "Don't count on it." 15:52 < qoxncyha> routers 'route' IP packets, is that correct? 15:52 < detha> yes 15:52 < Andrew_0010bit> "Please try again." 15:52 < qoxncyha> but their purpose isn't fundamentally to route MAC frames, right? 15:52 < dminuoso> qoxncyha: their purpose is fundamentally to route IP. 15:53 < dminuoso> qoxncyha: IP is not required to run on ethernet. 15:53 < Andrew_0010bit> Understanding the layering is crucial here. 15:53 < dminuoso> qoxncyha: You can run IP over other layers as well (such as token ring) 15:53 < qoxncyha> i understand that IP runs over MAC 15:53 < qoxncyha> is that correct? 15:53 < dminuoso> Or IP over avian carriers. 15:53 < dminuoso> (Which has even been done) 15:53 < qman__> networking: in most of the US, it depends on whether you have "a reasonable expectation of privacy" 15:53 < dminuoso> qoxncyha: Not necessarily, that's the point. 15:54 < qoxncyha> sure, L3 runs over L2 15:54 < Andrew_0010bit> dminuoso, "It would seem your issue is that you've lost your Tolkien ring." 15:54 < qoxncyha> a part of a router's purpose is also to remap IP subnets, right? 15:54 < detha> rarely 15:54 < dminuoso> qoxncyha: a routers purpose is just to *route* IP packets. 15:54 < Kartagis> I can dig, but not nslookup 15:55 < Andrew_0010bit> http://dilbert.com/strip/1996-05-02 15:55 < detha> Kartagis: nxdomain response cached somewhere, probably 15:55 < baitshell> =))) 15:55 < Andrew_0010bit> http://galaxy.uci.agh.edu.pl/~szymon/humor/tolkienring.txt 15:55 < qoxncyha> there's also `host -t a www.whatever.com` 15:55 < qoxncyha> you can use it for things other than a records 15:55 < Kartagis> qoxncyha: me? 15:55 < dminuoso> qoxncyha: https://resources.stuff.co.nz/content/dam/images/1/a/4/g/i/v/image.related.StuffLandscapeSixteenByNine.620x349.1a4dde.png/1456944457750.jpg 15:55 < qoxncyha> Kartagis: yes 15:55 < dminuoso> qoxncyha: thats what a router is. 15:56 < dminuoso> qoxncyha: It just decides on the path a packet takes. 15:56 < dminuoso> and it operates on IP packets. 15:56 < qoxncyha> dminuoso: routers are always on IP or just L3? 15:56 < compdoc> how did they fit those little people in my router?!! 15:56 < Andrew_0010bit> compdoc ^ 15:56 < Kartagis> qoxncyha: host not found 15:56 < detha> dminuoso: that's a 20-spur router, not 20-port 15:57 < Andrew_0010bit> Routers work on layers. 15:57 < Andrew_0010bit> Everything works on layers. 15:57 < qoxncyha> Kartagis: `host -t a google.com # google.com has address 172.217.4.238` 15:57 < Andrew_0010bit> Just like how a switch has a table of all the MACs it's connected to and can therefore automatically "switch" MAC frames. 15:57 < dminuoso> qoxncyha: You could say L3 is for routing yes. 15:57 < qoxncyha> Kartagis: `host -t txt google.com # google.com descriptive text "v=spf1 include:_spf.google.com ~all" ...` 15:57 < dminuoso> qoxncyha: (According to the OSI model) 15:58 < dminuoso> qoxncyha: Please do take note that the OSI model is not "that's how networking is" 15:58 < dminuoso> It's more of a "guidance" 15:58 < qoxncyha> dminuoso: sure, it's just convention 15:58 < qoxncyha> yes 15:58 < Andrew_0010bit> dminuoso, that's very helpful too. 15:58 < qoxncyha> switch, hub, bridge: these are all synonyms, correct? 15:58 <+pppingme> Its a "guidance" that very closely reflects reality 15:58 < dminuoso> qoxncyha: No. 15:58 < dminuoso> qoxncyha: there's a fundamnetal difference between switches and hubs 15:59 < Andrew_0010bit> And bridges, for that matter. 15:59 < dminuoso> qoxncyha: a switch can be thought of as a layer 2 router 15:59 <+pppingme> hubs = layer1, switches = layer2 15:59 <+pppingme> thats a bad description 15:59 < Kartagis> qoxncyha: is there a website I can query this? 15:59 < qoxncyha> dminuoso: i was just told that switches do not 'route' MAC frames for any definition of the word 15:59 < Andrew_0010bit> pppingme, I agree. 16:00 < Andrew_0010bit> qoxncyha, they "switch" MAC frames. 16:00 < qman__> networking: for example, if you went to their building for an in-person interview, they could legally record it because you do not have a reasonable expectation of privacy from them on their premisis 16:00 < qoxncyha> Kartagis: i can't recommend one personally but https://dnslookup.org/ looks good 16:00 < likcoras> Kartagis: there's also this tool drill, useful sometimes for issues like these. drill -T $addr would do the recursive lookup yourself, sometimes helpful for diagnosing problems. 16:01 < qoxncyha> pppingme: what about bridges? 16:01 <+pppingme> bridge = switch in most situations, although the term bridge is often misused 16:02 < Spice_Boy> a bridge lets you drive over water 16:02 <+pppingme> typical (and correct usage) many 2-port devices are referred to as bridges, although note that bridges are NOT limited to two ports 16:02 < compdoc> I love my Einstein-Rosen bridge 16:03 < detha> compdoc: want to add to your collection? I have another bridge to sell you 16:04 < compdoc> hey, I didnt just fall off the turnip truck ya know 16:04 < dminuoso> qoxncyha: An ethernet switch forwards frames based on MAC addresses. A router routes based on IP address. The concepts are similar on an abstract level, but fundamentally different on what they mean. 16:04 < Sout> haha compdoc had to google to get that reference :D 16:05 < compdoc> :) 16:06 < dminuoso> qoxncyha: A switch is something you can plug a bunch of devices into, and the switch will facilitate that they can all communicate with each other. They usually do so efficiently by learning MAC addresses and taking a "local" routing decision (which frame goes where) 16:06 < Kartagis> qoxncyha: dnslookup finds it, but our network can't 16:07 <+pppingme> Spice_Boy you're alive! 16:07 < Spice_Boy> of course I am 16:07 < Spice_Boy> about to go to bed though 16:07 < dminuoso> qoxncyha: http://www.practicalnetworking.net/wp-content/uploads/2016/01/packtrav-host-switch-host.gif here is a nice animation of what a switch does =) 16:08 < detha> Kartagis: what does your network use for a name server? 16:09 < winsoff> Wait a second. 16:09 < winsoff> So the suite that replaced netstat with ss is the same suite that introduced the whole "ip" command situation? 16:09 < likcoras> winsoff: what's wrong with ip? 16:09 < winsoff> I thought the "ip" command was a systemd thing. At least now I have a reason to learn it. 16:09 < qoxncyha> Kartagis: your DNS server is probably caching 16:09 < dminuoso> qoxncyha: So in all senses switches do routing on layer 2. But the routing is not to enforce policies or based on "decisions". It's just a static concept to ensure connecticvity. 16:09 < winsoff> likcoras, I thought it was some monolithic thing 16:10 < rewt> ip has been around a lot longer than systemd 16:10 < qoxncyha> Kartagis: DNS servers like to cache overzealously 16:10 < qoxncyha> some will flat-out ignore your TTL 16:10 < dminuoso> qoxncyha: and there's things like flooding going on, so the routing is more of an efficiency thing to avoid the problems that hubs bring 16:10 < qoxncyha> dminuoso: sorry, i had to step away for a second. let me read through what you've said. 16:11 < rewt> there was some blog post recently that implied it was part of systemd, and that was very misleading 16:11 < likcoras> ifconfig has been limited by the amount of scripts that depend on it, thus it was hard to update it to accurately convey the actual network situation without breaking all the scripts. 16:11 < winsoff> also, how do I traceroute in linux without getting completely dogged by big boy network firewalls? 16:11 < dminuoso> qoxncyha: If you take the postal analogy http://www.dailyherald.com/storyimage/DA/20110419/news/704199921/AR/0/AR-704199921.jpg&updated=201104191145&MaxW=800&maxH=800&noborder 16:11 < rewt> and some scripts want to be cross-platform, so they use ifconfig for that reason 16:11 < qoxncyha> Kartagis: you can also try using a different DNS server other than the default one you're configured with 16:11 < qoxncyha> Kartagis: i like 1.1.1.1 16:11 < winsoff> I guess the question is "how do I get windows-like reliability out of traceroute" 16:12 < likcoras> I thought the ip transitionw was being done by the kernel people? 16:12 < rewt> winsoff, that question makes no sesnse 16:12 < rewt> traceroute is traceroute 16:12 < winsoff> rewt, when I use tracert on windows, I usually get a full set of datapoints (from point to point) 16:12 < rewt> your os has no bearing on what routers along the route do 16:13 < winsoff> but traceroute on linux, even with -I, usually only gives me up to the edge router of the current net 16:13 < dminuoso> qoxncyha: actually screw it, this analogy - as nice as it may be - is not so helpful to understand networking from =) 16:13 < qoxncyha> dminuoso: that practicalnetworking gif is great 16:13 < qoxncyha> still reading 16:14 < qoxncyha> what happens if a MAC device is disconnected? 16:14 < qoxncyha> is there an ACK for MAC? 16:14 < detha> winsoff: --U 16:14 < grawity> depends on the specific MAC layer, some have ACKs, some don' 16:15 < qoxncyha> what happens in the former case when a MAC device is disconnected? 16:15 < regdude> if a host is disconnected, then it will trigger a link state change (if connected directly to a switch), which will flush the MAC addresses on the port that have been learned by the switch 16:15 < dminuoso> qoxncyha: so switches are the solution "64 devices connected to network device. how do we a) let them all talk to each other, while b) avoid each broadcasting their traffic to everyone 16:15 < jvwjgames_> Hello 16:15 < qoxncyha> regdude: so they 'feel' the jack in the connection so to speak, right? 16:16 < winsoff> detha, interesting. I'll try it. 16:16 < dminuoso> qoxncyha: (they offer some other things too, but that shall be irrelevant) 16:16 < jvwjgames_> how do i find the ipv6 gateway of my ipv6 address 16:16 < regdude> if a host is disconnected indirectly, then the switch will have to wait until the entry times out, at this point the same computer will not receive packets if connected on a different port (indirectly) 16:16 < qoxncyha> just a yes or no 16:16 < Dagger> if you meant "how do I find the IPs of routers on my network", use `rdisc6` 16:17 < qoxncyha> switches 'feel' the jack in the connection so to speak, right? 16:17 < Dagger> although if you have autoconf enabled then you can probably just look at your routing table 16:17 < regdude> you asked what happens 16:17 < qoxncyha> regdude: i'm asking too many questions 16:17 < regdude> what do you mean "feel"? 16:17 < dminuoso> qoxncyha: you can even observe this on some network devices. 16:17 < qoxncyha> they can tell if the jack is plugged or unplugged 16:17 < dminuoso> qoxncyha: many network devices have some `LNK` and `ACT` leds 16:18 < dminuoso> qoxncyha: the `LNK` led denotes whether there's an active ethernet link 16:18 < regdude> directly they can (if they are diffrectly connected to the switch) 16:18 < qoxncyha> using electrical resistance, presumably? 16:18 < regdude> indirectly there is RSTP that can help sometimes 16:18 < regdude> no, just voltage 16:18 < qoxncyha> okay 16:18 < qoxncyha> thanks :) 16:19 < regdude> 1 = 5V, 0 = something a lot less. No volts = no signals = no cable 16:19 < dminuoso> qoxncyha: ethernet in its specification has a kind of handshake 16:19 < regdude> and then the initiate the linking protocol 16:20 < dminuoso> qoxncyha: in this phase they do autonegotation these days to figure out what both devices can do (can they do 10BASE-T, or maybe 100BASE-TX), simplex or duplex, etc.. 16:22 < dminuoso> qoxncyha: So regarding the difference with router. A router otoh makes path decisions. It's the solution to "I have a package for 12.34.56.78 but I have no clue how to get it there" 16:22 < dminuoso> (Because that address is not in your network) 16:23 < dminuoso> qoxncyha: So the first router you have is usually inside your own OS. It's the systems routing tables. 16:23 < dminuoso> It makes the first decision "given this IP address, where should we put it? where should we send it?" 16:24 < qoxncyha> i'll have more questions later, i have to work now :) 17:10 < wallbroken> hello 17:10 < wallbroken> does somebody kknow how bluetooth works? 17:11 < wallbroken> when i enable bluetooth on a device, what happens? this device looks for available devices and connects to already paired ones? 17:11 < djph> wallbroken: magic. and radio 17:12 < wallbroken> djph, yes, but what about my question? 17:12 < djph> I answered it. You asked how it works. 17:12 < djph> Your secondary question, "well it depends". Most devices will only talk to those that they're already paired for. 17:13 < djph> similarly to wifi (not not the same) 17:13 < wallbroken> djph, can you be more specific? 17:14 < wallbroken> i have two ends: a smartphone and an auricolar 17:14 < djph> OK 17:14 <@xand> a what 17:14 < wallbroken> what happens when i enable each of them? 17:14 < djph> they turn on. 17:14 < wallbroken> xand, i'm not native english, i mean "in ear audio" 17:14 <@xand> earphones? 17:14 < wallbroken> we call it "auricolari" 17:15 < wallbroken> yes right 17:15 < wallbroken> earphones 17:15 < wallbroken> i have a bluetooth earphones and a smartphone connected via bluetooth to it 17:16 < wallbroken> in my case, there is a problem: if i do enable my earphones before enabling bluetooth on smartphone, it won't automatically connect 17:16 < wallbroken> and i need to go smartphone settings to connect it 17:16 <@xand> don't disable bluetooth on the phone 17:16 < djph> because the headphones only look for a device to pair with when they turn on. 17:17 < wallbroken> djph, the earphones how look for device to pair? 17:17 < wallbroken> it listens for other device's presence messages? 17:18 < djph> what do you mean "how". You tell them "hey you're paired with these devices" 17:18 < wallbroken> let me clarify that my goal is "understand how the mechanism works" 17:18 < Meta> That's a rabbit hole. 17:18 < djph> ^^^^^^^^^^^^^^^^^^^^^^^ 17:19 < wallbroken> by "how" i mean, ie: the earphones sends a broadcast message to say: "who is alive?" 17:19 < djph> and a lot of it will come down to "implementation". It might be as simple as "here's the list of MAC addresses you know, on boot run through it once" 17:19 < wallbroken> expecting some answer 17:20 < djph> you're going to have to read *A LOT* of the technical stuff 17:20 < wallbroken> djph, i guess now it's clear what kind of answer i'm looking fore 17:20 < Meta> Headphones tend to be dumb devices. 17:21 < djph> the datasheets, whitepapers, etc ... it's not going to be easy by any means; and more than a small portion of that is going to be locked up as "corporate secrets" (etc.) 17:21 < Meta> They'll connect to a smarter device just coz they're told to. 17:22 < wallbroken> djph, and smartphone side is symmetric? it searchs for paired devices to connect? 17:22 < djph> no 17:22 < djph> the smartphone doesn't necessarily care 17:22 < wallbroken> if i do use my other smartphone, it behaves differently 17:22 < wallbroken> it connects automatically even if i enable bluetooth after turning on the earphones 17:23 < djph> I mean, yes it MAY act like a client (e.g. with a laptop); but in general, it's gonna be "i'm the master" 17:23 < Meta> That's probably a setting in the phone itself 17:23 < Meta> I can connect automatically to my headphones on my phone, or I can tell it not to 17:23 < wallbroken> my iphone: if i do enable bt after the earphones, i need to connect it manually 17:24 < wallbroken> my android phone: if i do enable bt afte the earphones, it connects automatically the same 17:24 < Meta> Different implementations. *shrug* 17:26 < wallbroken> djph, told, smartphone is the "master" 17:26 < wallbroken> not sure of what does it mean 17:26 < wallbroken> *he 17:26 < djph> you're holding the iDevice wrong. 17:26 < djph> (that's never gonna get old) 17:30 < wallbroken> djph, it could simply be that when you enable bluetooth on some smartphones,it automatically search for paired devices and automatically connect to it? 17:31 < djph> perhaps. read the documentation. 17:32 <@xand> not really a networking question anyway >.> 18:06 < skyroveRR> . 18:46 < CoolerZ> likcoras, yeah you were right 18:47 < CoolerZ> repl.it does use the HOST http header to find out which webapp you are trying to access 18:48 < CoolerZ> is there a SOCKS5 over HTTP protocol? 18:48 < CoolerZ> https://github.com/jpillora/chisel 18:48 < CoolerZ> ? 18:57 < scratchfury> as a Cisco shop that might be forced into using Extreme, is it worth trying to fight for using Cisco or even reason "why not HP?" to new upper management? 18:59 < ||cw> scratchfury: it's always worth voicing legitimate concerns, especially if you'll lose access to features that you can assign a ROI to 19:00 < ||cw> but even lacking that, you can assign a dollar amount to training and lost productivity during the transition, which ALWAYS takes longer than the sames guy says. 19:01 < ||cw> sames/sales/ 19:01 < scratchfury> this is true 19:25 < mcavendish> hello 19:26 < mcavendish> anyone familiar with netiron os? 20:12 < Apachez> nope 20:12 < Apachez> brocade gear? 20:12 < Apachez> arent they extreme networks nowadays? 20:13 < scratchfury> I'm pretty sure they bought that particular part of Brocade 20:14 < scratchfury> Ruckus bought the FastIron part 20:14 < scratchfury> err... Arris 20:18 < sidco> Howdy folks. I am working on a shared front end. I opened port 80 to point at the firewall (pfsense, fresh install), enabled HA proxy, setup 3 front ends (2 domain + sub domain) and 3 backends. I am able to access the servers internally but not externally, like HAproxy took over DNS. https://pastebin.com/dnCKpLde 20:18 < TheSameNow2> I've followed the tutorial here: https://mullvad.net/en/guides/bittorrent/ but the SOCKS5 proxy thing doesn't work.. the torrents won't download.. what's the matter? 20:19 < sidco> Do you have DHT enabled? 20:24 < TheSameNow2> it's only possible to enable that when the proxy servers are set to none. but the downloads work without having DHT enabled when the proxy server is disabled 20:24 < TheSameNow2> so no 20:25 < sidco> Are you using qbittorrent? 20:26 < TheSameNow2> yes 20:26 < TheSameNow2> downloaded it specifically to follow their tutorial 20:27 < TheSameNow2> I used uTorrent before, which is still installed 21:16 < TheSameNow2> soo.. to repeat myself: I've followed the tutorial here: https://mullvad.net/en/guides/bittorrent/ but the SOCKS5 proxy thing doesn't work.. the torrents won't download.. what's the matter? 21:24 < pressure679> You probably need an ID verification, passphrase, hash, to be trusted by the torrent server. 21:24 < sidco> I would follow up with mullvad. Follow instructions on a second computer, see if you have the same results. I can enable DHT when proxy server is set to SOCKS5. Reinstall utorrent (4.1.1) 21:25 < pressure679> Oh, wait, bittorrent, I do not know your answer TheSameNow2 21:33 < ALowther> Any suggestions for a router, at least 2 gigabit ports and 5 fast ethernet ports? No wifi needed or wanted. 21:33 < ALowther> Consumer, 2 computers and 3 VoIP lines 21:36 < djph> No such thing. 21:36 < djph> Edgerouter plus a switch. 21:37 < kottt> what's your budget? and no matter what your budget is, the answer is an EdgeRouter =) 21:38 < ALowther> Okay, why is there no such thing? Why is the answer an EdgeRouter? :) 21:38 < ALowther> Budget is < $100 21:38 < djph> because no one makes a router with a 5 port switch. 21:38 < djph> (for starters) 21:39 < ALowther> Well that is why I said, at least. 21:40 < ALowther> I've found some very affordable 5 port routers w gigabit, but I need a few more ports. 21:40 < kottt> the best, most affordable answer to your need for more ports, is a switch 21:41 < kottt> an external, unmanaged gigabit switch, you can get an 8-port for about $40 21:41 < RustyJ> 8-port edge..... 21:41 < kottt> and an EdgeMax router for another $50 21:41 < djph> RustyJ: is not a switch. 21:42 < djph> kottt: he'll probably need a little more than an el-cheapo switch (although, I *ASSUME* he wants PoE for those phones) 21:42 < RustyJ> djph, i'm confused by the usecase so i'll return to lurking 21:42 < djph> RustyJ: minimum six ports -- internet plus two computers and three phones. 21:43 < djph> (barring obvious "phones have passthru ports") 21:43 < detha> I shall start calling those 'wired tethering ports' 21:44 < djph> detha: "a mistake" ? 21:44 < djph> ALowther: probably best to lay out the exact port requirements, since we're all making some guesses here ... 21:46 < ALowther> 300Mbps from ISP, so gigabit needed for PC & laptop so speed isn't lost via fast ethernet, then 3 VoIP phones, each with a power adapter, so PoE isn't necessary. 21:46 < RustyJ> i'm confused still cause in my goofy mind.... router _>>>>>> POEswitch----Switch 21:46 < ALowther> I would assume VoIP doesn't need more than 100Mbps, but maybe it does 21:47 < detha> phones work perfectly well on 100Mb/s 21:47 < nosmelc> I have a router that is vulnerable to that VPNFilter malware. Is there a way to determine if it's already infected? 21:47 < djph> RustyJ: that's the right way to do it. 21:48 < josuah> is there any convention about how to represent network stuff in ascii? 21:48 < djph> nosmelc: did you leave it with default credentials? 21:48 < djph> josuah: not really no 21:48 < josuah> like router, serial lines, ethernet, interfaces, bridges... 21:48 < nosmelc> djph, you mean the admin user and password? 21:48 < djph> nosmelc: correct 21:48 < josuah> djph: thanks. Well we're free then ;) 21:48 < nosmelc> djph, ohh i changed the password 21:48 < kottt> all-in-one consumer routers are hot trash 21:49 < kottt> get something where the first step of troubleshooting isn't "turn it off and back on again" 21:49 < djph> nosmelc: then, at least given what I've read, your chances of "already being infected" are low. But, there's still a lot of "we don't know how it works" out there 21:49 < kottt> bc if that's the first step it means the device is running too many services and they're poorly optimized >_>; 21:49 < djph> kottt: errr, an etch-a-sketch? 21:49 < kottt> pretty sure the first step of troubleshooting an etch a sketch is to shake the damn thing so nah 21:50 < kottt> that's functionally a reboot 21:50 < nosmelc> djph, according to Mikrotik I need to be at a newer version RouterOS to fix the vulnerability 21:50 < djph> kottt: bahhahahaha 21:50 < djph> nosmelc: so then do that 21:50 < RustyJ> kottt, the first step it to use a bleach wipe.... kids touch those things and we all know kids are DIRTY 21:50 < nosmelc> djph, I will, but I was just wondering if I can determine if it's already infected? will a RouterOS upgrade wipe an infection? 21:50 < djph> RustyJ: I prefer the spray - gets under the knobs. 21:51 < kottt> anyway, EdgeRouters are winning big points for me right now for not being on the list of VPNFilter infections 21:51 < djph> nosmelc: "maybe". I don't 'tik. However, I know most firmwares wipe the entirety of NVRAM 21:51 < kottt> glad i put my RT-N66u behind an EdgeRouter approx 2 weeks before VPNFilter landed 21:51 < djph> kottt: so it got infected by your windows PC then, amirite? :D 21:52 < kottt> well- 21:52 < kottt> i'm not actually clear on how VPNFilter spreads, tbh 21:52 < kottt> is it an actual virus or is it just portscanning and default credentials? 21:52 < RustyJ> i thought photobucket 21:52 < djph> kottt: not entirely sure myself, but it was funny :) 21:53 < kottt> =) technically speaking the only machines that should have direct access to my RT-N66u are running Linux 21:53 < Perme8> is there a different irc for networking career discussion, im looking for direction 21:53 < djph> I don't know how stage1 gets on the router. stage2/3 are photobucket, etc. Something about the payload being hidden in the exif data 21:54 < kottt> it's serving as a wireless repeater because it's a better option than ethernet over powerline adapter 21:54 <@xand> djph: default credentials mostly 21:54 <@xand> according to wikipedia, source of all knowledge :P 21:55 < djph> xand: yeah, but the specifics was "default credentials from .... where" (as in an infected computer, or IoT thing, or driveby on the wan side) 21:55 <@xand> ah 21:55 <@xand> yeah would be surprised if all those things allowed WAN access to the management interface by default 21:56 < djph> it's mostly consumer garbage, I wouldn't be :) 21:56 < nosmelc> So the malware connects to the router's management interface over the Internet? 21:56 <@xand> probably CSRF exploits to go with 21:56 < RustyJ> Perme8, since most/all peeps here are netadmins/enginerds/installers and what not...this is a good place to discuss edu/career options 21:57 < sidco> djph: because no one makes a router with a 5 port switch. > Qotom does, https://www.amazon.com/Firewall-Appliance-Gigabit-Celeron-Barebone/dp/B0741F634J I dont have this unit but two other ones by wotom that are working great. 21:57 < djph> nosmelc: one would imagine "no" (what because even halfway decent things are on there) -- but it doesn't preclude dumbasses doing dumb things :) 21:58 <+catphish> sidco, djph, pretty sure most mikrotik routers contain a 5 port switch 21:58 <+catphish> in fact, almost every soho router does under the hood 21:59 < djph> sidco: by the thing, it sounds more like a barebones PC with half a dozen ports 21:59 < djph> sidco: but hey, if it routes ... 21:59 <+catphish> mikrotuk def does 21:59 < djph> catphish: yeah, but they're not "1x routed plus 5x switched" (most of the time) 22:00 <+catphish> what? 22:00 < djph> catphish: he needed a router with 5x lan ports 22:00 <+catphish> oh, you mean 6 ports rater than 5 22:00 <+catphish> yeah no 22:01 < detha> most are a 4-port switch plus one interface 22:01 < djph> yeah, I thought I said "they don't have 5x switchports" (of course they have 1x "WAN" plus 4x "switched LAN" -- although now that I think about it, and ER-X-SFP ... ) 22:01 < djph> *an ER-X-SFP 22:01 <+catphish> they're either 4+1 or just 5 22:03 < detha> mikrotik at some stage made 5-port things implemented with something like an 8-port asic, one port connected to the CPU, and vlan-tagged all other ports to the CPU 22:05 < ALowther> Thanks, I'm looking into things.] 22:21 < nosmelc> If I upgrade the RouterOS and firmware on a Mikrotik device, that won't wipe the existing configuration, right? 22:24 < detha> Normally it won't. That doesn't mean you do not have to make a backup of the configuration before upgrading. 22:24 < nosmelc> detha, yep I got a backup just now 22:28 < nosmelc> Although I'm a bit confused about the difference between a .backup binary backup and a .rsc text backup 23:00 < Johnjay> fun networking fact 23:00 < Johnjay> i used rsync to make a backup of my hard drive to a usb stick. i used the options -zyvv thinking that would use compression 23:01 < Johnjay> but the resulting files were not compressed. turns out that -z only compresses the *transmission* of files for networking purposes 23:01 < mawk> indeed 23:02 < Johnjay> i'm debating whether to wipe the partition and restore it just to see if restoring the rsync files is sufficient for a backup or if i need to use gparted or dd or something 23:02 < Johnjay> dd would be bad since i filled the hard drive with random 0's and 1's just yesterday 23:04 < mawk> why did you do that ? 23:04 < mawk> well it doesn't matter much 23:04 < mawk> use dd in sparse mode 23:06 < Johnjay> well i read somewhere if you just wipe your drive with zeros that's not good enough 23:06 < Johnjay> if some super secret gov machines are used to recover data 23:07 < Johnjay> so i did dd if=/dev/urandom of=/dev/sda bs=4096 23:07 < Johnjay> not realizing that makes it hard to compress a dd copy of the drive 23:10 < Johnjay> i don't really get what the man page is saying 23:10 < Johnjay> sparse means that dd just skips zero blocks/ 23:19 <+pppingme> Johnjay ideally, you'll want to change every bit on the drive 4 times I think.. that should, in theory, make it unrecoverable 23:20 < Johnjay> pppingme: i'd like a source for that number if it's not too much trouble 23:20 < Johnjay> is that the gutman 35 rule? 23:20 < Johnjay> but like, more sane? 23:22 <+pppingme> this says 3 times: https://cdrglobal.com/what-is-a-dod-multiple-pass-hard-drive-wipe/ 23:26 <+pppingme> there's also this, 7 pass: https://www.blancco.com/blog-dod-5220-22-m-wiping-standard-method/ 23:26 < Johnjay> ok thanks 23:27 < Johnjay> is that negated if i rewipe it with 0's after doing all of that do you think? 23:27 < mawk> gutman is obsolete 23:28 < mawk> some also say it's harmful 23:28 < mawk> compared to 3/7 passes 23:28 < mawk> no it's not negated, you can do whatever you want 23:28 < mawk> after 23:28 < mawk> I think 23:28 < Johnjay> that's cool 23:30 <+pppingme> Johnjay you old enough to know what a cassette tape is? 23:30 < Johnjay> i guess so 23:30 < Johnjay> i've seen them . :D 23:30 <+pppingme> then you may not understand this example 23:31 <+pppingme> if you take a cassette, with a good recording, then record over it, and play it back, if you turn it way way up, and listen to the background hiss, you could still make out the original recording.. 23:31 <+pppingme> record over it multiple times, and that goes away (although you now hear remnants of the newer recordings).. 23:31 <+pppingme> the concept is the same with drives.. 23:32 <+pppingme> in fact, the tech isn't really that different.. 23:44 < Johnjay> weird 23:44 < Johnjay> oh yeah 23:44 < Johnjay> i guess that makes sense. it's still some kind of magnetic storage 23:44 < Johnjay> i wonder where dd gets its random seed from 23:45 < Johnjay> because doing the command dd if=/dev/urandom might lead to the same sequence of 1s and 0s each time 23:45 < sidco> I am working on a shared front end for HAProxy. I opened port 80 to point at the firewall (maybe this was my mistake), enabled HA proxy, setup 3 front ends (2 domain + sub domain) and 3 backends. I am able to access the servers internally but not externally, like HAproxy took over DNS for those domains. https://pastebin.com/dnCKpLde 23:47 < ska> Anyone know what happened with Comcast+Att network problems? 23:57 <+catphish> Johnjay: dd doesn't generate random data, you're just reading from a file (/dev/urandom) 23:58 < Johnjay> right. i googled and i can't tell if urandom will change with different boots with minimal user interaction 23:58 < Johnjay> but my guess is it does 23:58 <+catphish> Johnjay: that file contains a pseudorandom string of data 23:58 < Johnjay> keep in mind i'm booting from a ubuntu cd in this scenario 23:58 <+catphish> it's seeded by /dev/random, which contains real random data 23:59 < Johnjay> i see 23:59 <+catphish> that real random data is generated from user interaction and other things considered sufficiently random to be secure --- Log closed Sat Jun 09 00:00:42 2018