switch to room list switch to menu My folders
Go to page: [1] 2 3 4 5 ... Last
↑↑↑ Old messages ↑↑↑            ↓↓↓ New messages ↓↓↓
[#] Wed Sep 21 2011 01:04:01 EDT from the8088er @ Uncensored

[Reply] [ReplyQuoted] [Headers] [Print]

Yeah. That's prohibitive. Who provides leased lines? We aren't trying to
do it for cost savings as much as because the only internet we can get
is 1.5 MBPS for $129 a month after $200 setup and $395 equipment costs

Do you just call AT&T and say you want a T1 or something? I imagine
that's probably around $1000+ a month plus installation anyway, and for
1.544 MBPS at that.

[#] Wed Sep 21 2011 10:58:18 EDT from IGnatius T Foobar @ Uncensored

[Reply] [ReplyQuoted] [Headers] [Print]

If both ends of the line are local, you get a T1 from your local exchange carrier (at&t, Verizon, Qwest, etc). That is assuming that neither end is a "lit building" which, based on your sparse Internet options, I am assuming is not the case.

[#] Fri Sep 23 2011 12:58:23 EDT from Animal @ Uncensored

[Reply] [ReplyQuoted] [Headers] [Print]

Question for the phone geeks.

Coworker got a strange call from a number in oklahoma. Call went
unanswered, but a voicemail was left. Coworker dialed into his VM box,
message was silence.

Then his phone started dialing an 866 number. He hung up.
Dialed back into voicemail, play the message, same thing happens.

Googling the 866 number returns hits that it's a credit card scam.

How the hell can a voicemail prompt a phone to dial out like that?
We have an Avaya IP Office phone system here.

[#] Fri Sep 23 2011 13:08:11 EDT from zooer @ Uncensored

[Reply] [ReplyQuoted] [Headers] [Print]

Was it dialing or was the voicemail just the tones of the keys being pressed?

[#] Fri Sep 23 2011 13:28:04 EDT from IGnatius T Foobar @ Uncensored

[Reply] [ReplyQuoted] [Headers] [Print]

If the phone actually started dialing in response to the tones, it is *badly* misconfigured. VoIP systems are quite often scanned for the ability to route outbound calls through them, similar to the way spammers hunt for open relays.
I haven't heard of this particular trick before, but I can't see any way that it would actually work.

[#] Sat Sep 24 2011 00:25:12 EDT from Animal @ Uncensored

[Reply] [ReplyQuoted] [Headers] [Print]

That was my thought, but apparently there were no audible DTMF tones in
the voicemail. The call log on the phone showed two outbound calls.

In other news... i'm fed the fuck up with my ipod. So... put up a few
for-sale posts.

Looking at a Droid X or X2 as its replacement, eventually it may
replace my Treo. I have very little experience with droids, but since
they're not tied to itunes it's got to be an improvement. Used my ipod
mostly as a music player, same way my old 2nd-gen iPod got used... Nice
to throw pics on it though, and the browser/email features on wifi was
nice. I really didn't use "apps" aside from iBooks with all my service
manuals on it.

Having previous experience with TI's OMAP processors... snappy and work
well... the X has that going for it. Newer hardware, dual-core
processor are the benefits to the x2... which one would you go with?

[#] Mon Sep 26 2011 16:04:49 EDT from Ford II @ Uncensored

[Reply] [ReplyQuoted] [Headers] [Print]

I bet somebody figured out a way (either really fast clicks that are inaudible to the human ear or something like that, that can be picked up by the phone, but can't be heard in the traditional sense) to get the voicemail to record the clicks.
Remember when we used to set modems to dial dtmf with such short tones and delays you could barely tell it was dialling? That was 20 years ago, I'm sure the technology has gotten a lot better.

[#] Sun Oct 30 2011 05:54:28 EDT from TheOneLaw @ Uncensored

Subject: NLOS

[Reply] [ReplyQuoted] [Headers] [Print]


Wed Sep 14 2011 01:26:40 EDT from the8088er @ Uncensored
Does anyone have any experience setting up a long range ewireless ethernet bridge? I'm looking at using Motorola Canopy equipment to span around 4.1 miles.

We used Ubiquiti (2.4,g) equipment to go much further than that - assuming you have LOS or NLOS.

It is cheap, and it works - you only need to get a good higain grid or panel antenna to pull it off..

We covered 6000km2 of jungle with wifi, and hooked up to 35km at the longest link.

If you are trying to look through a building, a hillside or whatever then it is a different story altogether.

We considered the Canopy system for about a year before deciding it was simply too unreliable and expensive..


[#] Tue Nov 01 2011 21:13:19 EDT from the8088er @ Uncensored

Subject: Re: NLOS

[Reply] [ReplyQuoted] [Headers] [Print]

Thanks, I will look into that as a solution. We still haven't settled on something. It sounds like you were doing point to multipoint. We are just doing point to point so it should be simpler still.

[#] Wed Nov 30 2011 15:10:17 EST from Spell Binder @ Uncensored

[Reply] [ReplyQuoted] [Headers] [Print]

Who here proclaims to be proficient with both Wireshark and sendmail?

Yesterday I was trying to debug an issue with one of our Linux hosts sending e-mail to our corporate mail server. My first instinct was to do grab a trace of the SMTP session via tcpdump. I was quickly foiled when sendmail decided to do a "STARTTLS."

Before I go any further, I did eventually decide to just disable TLS in the sendmail config so I could get a plain-text capture.

Before I got to that point, though, I tried to get Wireshark to decrypt the TLS session to no avail. I found instructions on Wireshark's website about how to configure it to use a key file, but I think my issue was that I was never able to figure out where exactly sendmail gets its keys from. I was able to find in the file where all the certificate and key files and directories are configured (/etc/pki/tls/certs), but when I checked in that directory, the only file that exists is ca-bundle.crt, which contains a bunch of certificates. None of the .pem files that were referenced exist.

From poking around, I did find a localhost.key in the /etc/pki/tls/private directory, but when I tried that with Wireshark, it still wasn't able to decrypt the session.

Is this a case where I would need the private key for the corporate e-mail server? Or did I just not grab the right key file from the host?
TLS Binder

[#] Wed Nov 30 2011 15:13:39 EST from Spell Binder @ Uncensored

[Reply] [ReplyQuoted] [Headers] [Print]

I almost forgot to mention that the Linux host is running Fedora release 11 (Leonidas).

[#] Wed Nov 30 2011 16:19:53 EST from IGnatius T Foobar @ Uncensored

[Reply] [ReplyQuoted] [Headers] [Print]

I would imagine that in order to get a protocol analyzer to decrypt TLS -- which is *exactly* what TLS is intended to prevent -- you would need to know the private keys used by *both* parties. Each host encrypts transmissions to the other host using the other host's public key, which is derived from its private key ... so you need to know both private keys, and also which is which.

It's much easier to simply turn off TLS while troubleshooting, unless that *is* the source of the problem (which it occasionally is).

[#] Thu Dec 01 2011 18:22:11 EST from LoanShark @ Uncensored

[Reply] [ReplyQuoted] [Headers] [Print]

It's even harder, if both ends negotiated an Ephemeral Diffie-Hellman cipher suite. In this case, an temporary DH keypair is created by each end, and authenticated with the private RSA key. You can't know the temporary private key, because presumably it is only stored in RAM long enough for the key exchange to take place, and then thrown away. So you need to be able to mount an active MITM attack in this case, even just to observe traffic.

[#] Thu Jan 12 2012 15:05:29 EST from Ford II @ Uncensored

[Reply] [ReplyQuoted] [Headers] [Print]

yeah man in the middle solves lots of problems, there should be a standard...

[#] Sat Feb 11 2012 12:41:20 EST from IGnatius T Foobar @ Uncensored

[Reply] [ReplyQuoted] [Headers] [Print]

host -t aaaa

[#] Wed Feb 15 2012 23:30:32 EST from ax25 @ Uncensored

[Reply] [ReplyQuoted] [Headers] [Print]

Dead beef cafe - ha.

Miss old "dead dad" we used to use for the IPX/SPX address on the Novell test server back in the day.

[#] Wed Mar 21 2012 10:45:50 EDT from LoanShark @ Uncensored

[Reply] [ReplyQuoted] [Headers] [Print]

Does anyone have strongSwan interoperating with Windows 7's VPN client in IKEv2 mode? Fought with that for half of yesterday and lost :(

[#] Wed Mar 21 2012 15:36:19 EDT from the8088er @ Uncensored

[Reply] [ReplyQuoted] [Headers] [Print]

My High School's WEP key incorporated the phrase "deadbadbeef".

[#] Wed Mar 21 2012 17:11:39 EDT from IGnatius T Foobar @ Uncensored

[Reply] [ReplyQuoted] [Headers] [Print]

<yorkshire accent>

You were lucky to have wifi! When I was in high school we had to carry floppy disks around.

</yorkshire accent>

Go to page: [1] 2 3 4 5 ... Last