<?xml version="1.0"?><rss version="2.0"><channel><title>Networking</title><link>https://uncensored.citadel.org/</link><image><title>Networking</title><url>https://uncensored.citadel.org/roompic?room=Networking</url><link>https://uncensored.citadel.org/</link></image>
<description>Networking</description>
<item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099534881</link><pubDate>Tue, 09 Sep 2025 01:25:37 -0000</pubDate><title>Hotel networks</title><guid isPermaLink="false">2099534881@Uncensored</guid><description><![CDATA[I sure do love modern hotel networks ... mainly because they now bring ethernet
into each room and you can tie into it. 
  
 Let's see ... here at the one I'm in right now, they have a Ruckus AP behind
the television, presumably one wire goes into the wall, it provides wifi for
the room, one port goes to the captive television box, and one more is open
for me to plug my laptop in.  If I go into a hotel that doesn't have a spare
port I just take the ethernet from the television. 
  
 It's nice to get a solid 100 Mbps (which is the physical port speed) without
having to deal with the captive portal. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099508512</link><pubDate>Fri, 14 Feb 2025 15:30:43 -0000</pubDate><title>RetroShare (I2P)</title><guid isPermaLink="false">2099508512@Uncensored</guid><description><![CDATA[<html><body>

<p>Hi guys, if some of you are using RetroShare over I2P, please add me to your circle:</p>
<blockquote>
<p><br />ABATxeFjmzv8pgGufEl3IT6TAxTfwbjsCaLHZ+biHt803TDGPDGXMgEGa2xvcHBvkEIAAAAEAApyZXRyb2JhbmhhcTJ6eHpvMmo0<br />M3FzYW5icXlvYm5sYXVqanh5eHFkenlkY3Vzb2E1NXpxLmIzMi5pMnAEAy1eVw==</p>
<p> </p>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099507627</link><pubDate>Sat, 08 Feb 2025 17:14:52 -0000</pubDate><title>Re: Trusting the new router</title><guid isPermaLink="false">2099507627@Uncensored</guid><description><![CDATA[Mikrotik recently refreshed the hEX (the router I use here at Awesome Acre)
with a new ARM chip and more memory.  That leads me to believe it's a popular
model but the previous CPU (a MIPS 1004Kc) days are numbered.  So that's great,
this model will continue on for quite a long time.  Of course if I were to
replace it now I'd probably go for the L009 because it's got that "homelab
tinkerer" groove to it :) 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099506734</link><pubDate>Sun, 02 Feb 2025 00:23:22 -0000</pubDate><title>Re: Trusting the new router</title><guid isPermaLink="false">2099506734@Uncensored</guid><description><![CDATA[Yes, I was the Mikrotik dude.   
  
 Fun part is a psychiatric patient was the one who first told me about them
XD 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099506132</link><pubDate>Mon, 27 Jan 2025 14:17:11 -0000</pubDate><title>Message #2099506132</title><guid isPermaLink="false">2099506132@Uncensored</guid><description><![CDATA[<html><body>

<p>Speaking of TP link, they may be banned shortly in the US like Huawei.  Even tho officially they are built in Vietnam, and funneled thru a company based in California.  And as of yet its just rumor so unsure what 'ban' means.  No more selling to state/federal entities? No more selling to anyone?  Or an actual purge and if they are detected on the wire, your ISP shuts you off?</p>
<p>i wonder which other brand paid off the feds to get that thru..  None of this is about national security, its all about money. ( i hear they are the most popular brand for home use so mega money coming in to replacements ) </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099506081</link><pubDate>Sun, 26 Jan 2025 15:29:51 -0000</pubDate><title>Re: Trusting the new router</title><guid isPermaLink="false">2099506081@Uncensored</guid><description><![CDATA[<html><body>

<blockquote>
<div class="message_content">
<div class="fmout-JUSTIFY">I suggest you take a look at RouterOS network flowchart. <br /><br />Lots of operations can be carried out on specific hardware components, ie. if your router has 2 independent switches in its hardware configuration, the switches themselves can manage a lot of the traffic themselves without involving the CPU. However, as soon as you start doing layer 3 firewalling you will get the CPU involved for a high number of connections unless you offload it somehow.</div>
</div>
</blockquote>
<p>Right ... even my little Mikrotik hEX (as I mentioned, a USD$50 router ... you're using it right now by way of accessing this site) has a packet switch on the SoC and will forward packets at wire speed if it doesn't have to apply any transforms such as NAT or VPN or whatever.  I like how there's an actual forwarding rule in the configuration for "fastpath" to manage and track what's being forwarded that way.  I believe you were the one who turned me on to Mikrotik some number of years ago and I've been a big fan ever since.</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099505833</link><pubDate>Fri, 24 Jan 2025 13:21:34 -0000</pubDate><title>Re: Trusting the new router</title><guid isPermaLink="false">2099505833@Uncensored</guid><description><![CDATA[<html><body>

<p>There, i fixed it for you  .  lol</p>
<p>To be fair, they do have a good ecosystem, but they always chose the lowest possible arm soc available so they could be the cheapest on the market, but marketed it as 'more capable' so people bought into it, and many were turned off due to the lack of performance, giving the ARM world a bad name for a long time.  If they had marketed it for what it was, i ( and others ) would not dislike them so much.</p>
<blockquote>
<div class="message_header"><span>Fri Jan 24 2025 13:15:47 UTC</span> <span>from <a href="do_template?template=user_show?who=darknetuser">darknetuser</a> </span> <span class="message_subject">Subject: Re: Trusting the new router</span></div>
<div class="message_content">
<div class="fmout-JUSTIFY"><br />I am not aware of how RPI routers do it, but RPIs <strong>are pathetic pies of crap, by design.</strong></div>
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099505832</link><pubDate>Fri, 24 Jan 2025 13:15:47 -0000</pubDate><title>Re: Trusting the new router</title><guid isPermaLink="false">2099505832@Uncensored</guid><description><![CDATA[ > 2025-01-20 01:46 from zelgomer       
 >Subject: Re: Trusting the new router      
 > > 2025-01-19 11:53 from Nurb432 <nurb432@uncensored.citadel.org>      
  
 > >Subject: Re: Trusting the new router        
 > >Even lower than bottom..   considering the CPU In some of the        
 > >commodity routers are worse than an RPI.          
 > >        
 >        
 > But the CPU isn't doing the routing. They have some Broadcom ASIC     
 
 >doing the heavy lifting, and the CPU is only there for configuration.  
    
 >       
 >      
      
 I suggest you take a look at RouterOS network flowchart.     
    
 Lots of operations can be carried out on specific hardware components, ie.
if your router has 2 independent switches in its hardware configuration, the
switches themselves can manage a lot of the traffic themselves without involving
the CPU. However, as soon as you start doing layer 3
firewalling you will get the CPU involved for a high number of connections
unless you offload it somehow.   
  
 I am not aware of how RPI routers do it, but RPIs have abyssmal IO in general
so I am not optimistic. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099505435</link><pubDate>Tue, 21 Jan 2025 12:11:20 -0000</pubDate><title>Re: Trusting the new router</title><guid isPermaLink="false">2099505435@Uncensored</guid><description><![CDATA[<html><body>

<p>Would make it more flexible. But i can see that happening on enterprise level stuff where you need the bandwidth.  But home and small office, a cheapo CPU is more than enough to push those bits around.</p>
<blockquote>
<div class="message_header"><span>Tue Jan 21 2025 01:39:07 UTC</span> <span>from <a href="do_template?template=user_show?who=zelgomer">zelgomer</a> </span> <span class="message_subject">Subject: Re: Trusting the new router</span></div>
<div class="message_content">
<div class="fmout-JUSTIFY">
<blockquote><span style="background-color: transparent; color: navy;"> For some reason we don't route through the CPU, even though it would just be configuration or metrics type traffic. That's why I assumed it had to be that way.</span></blockquote>
</div>
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099505367</link><pubDate>Tue, 21 Jan 2025 01:39:07 -0000</pubDate><title>Re: Trusting the new router</title><guid isPermaLink="false">2099505367@Uncensored</guid><description><![CDATA[ > 2025-01-20 04:17 from IGnatius T Foobar <ajc@citadel.org>   
 >Subject: Re: Trusting the new router  
 >Yes and no.  For example, my little Mikrotik hEX (a USD$50 router) has 
 
 >a little SoC that includes a small switch fabric, but the only packets 
 
 >that are fast switched are the ones that don't have any transformation 
 
 >applied to them -- so basically that's just local traffic coming in and
 
 >out of the LAN ports.  
 > Anything being routed (especially if NAT is being applied, so that's  

 >pretty much all IPv4 traffic from most networks) needs to be forwarded 
 
 >by the CPU.  
 >   
 > And guess what: even my cheap little router can saturate a 1 Gbps   
 >pipe. This means that the typical residential network user, even an   
 >enthusiast, isn't going to notice the difference.  
 >   
 > Equipment containing a true programmable switch fabric (such as a   
 >Broadcom chip
like a Trident or Jericho) is going to be two orders of   
 >magnitude more expensive.  10 Gbps ports are entry level for that kind 
 
 >of equipment now.   
 >  
  
 This is very surprising to me. Where I work, every product we make has a
dedicated routing ASIC on the board. For some reason we don't route through
the CPU, even though it would just be configuration or metrics type traffic.
That's why I assumed it had to be that way. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099505301</link><pubDate>Mon, 20 Jan 2025 18:34:41 -0000</pubDate><title>*** router.</title><guid isPermaLink="false">2099505301@Uncensored</guid><description><![CDATA[<html><body>

<p>One of the weirdest things i have ever seen. </p>
<p>Take new router out to closet, all it does is keep power cycling.  I thought it might have been something i had plugged into the USB port for power that was pissing it off on boot. ( my security cameras wireless connection point ). So i punted until today for when i was bored. Grabbed a usb plug for the camera thing and tried it again.  Nope.  Remove all the cat 5 cables. Nope,. still power cycling.  Pull it off the battery side ( that is working fine for everything else ) and move it to the surge only side. Nope.  Bypass the power "box" totally and straight to 110 outlet. Nope.</p>
<p>Bring it back in the house. Works fine, just like last time. </p>
<p>wtf.</p>
<p> </p>
<p> </p>
<p>Yes i can get around it....</p>
<p>Option 1 - Move the router "inside" the house. But it also means relocating my 2 mini-servers that are out there now, the router, ups, camera endpoint, cables, bla bla.. so more stuff in my 'computer room/office' to deal with, along with my huge ass AI server box that is in here now. End of world? No. Annoying as all hell, yes. Noisier and warmer in here, yes.   Might be a power problem too having it all on one circuit. My AI box can suck up close to a KW at full blast.</p>
<p>Option 2 - Turn off WiFi on current router ( which is the current issue. being flaky now ), and stick this new one in the computer room for wireless only.   Would work with less space, but who knows how long the other is going to last since its acting up. And ill need another switch. Id be out of ports and do need a spare from time to time. Short of going wireless on my main PC i guess..</p>
<p>Option 3 - Move to another house that has plenty of room in the basement to do it all.  ( lol, id love to do that.. but nope )</p>
<p> </p>
<p>and i know an option would be go build one out of one of these multi-port arm boards i have around here that are meant for that, and leave things 'as they are' as far as location and such. But i just bought this stupid thing. Be nice to actually use it.</p>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099505219</link><pubDate>Mon, 20 Jan 2025 04:17:21 -0000</pubDate><title>Re: Trusting the new router</title><guid isPermaLink="false">2099505219@Uncensored</guid><description><![CDATA[Yes and no.  For example, my little Mikrotik hEX (a USD$50 router) has a little
SoC that includes a small switch fabric, but the only packets that are fast
switched are the ones that don't have any transformation applied to them --
so basically that's just local traffic coming in and out of the LAN ports.
 Anything being routed (especially if NAT is being applied, so that's pretty
much all IPv4 traffic from most networks) needs to be forwarded by the CPU.
 
 And guess what: even my cheap little router can saturate a 1 Gbps pipe. 
This means that the typical residential network user, even an enthusiast,
isn't going to notice the difference.
 
 Equipment containing a true programmable switch fabric (such as a Broadcom
chip like a Trident or Jericho) is going to be two orders of magnitude more
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099505195</link><pubDate>Mon, 20 Jan 2025 01:46:49 -0000</pubDate><title>Re: Trusting the new router</title><guid isPermaLink="false">2099505195@Uncensored</guid><description><![CDATA[ > 2025-01-19 11:53 from Nurb432 <nurb432@uncensored.citadel.org>   
 >Subject: Re: Trusting the new router  
 >Even lower than bottom..  considering the CPU In some of the  
 >commodity routers are worse than an RPI.   
 >  
  
 But the CPU isn't doing the routing. They have some Broadcom ASIC doing the
heavy lifting, and the CPU is only there for configuration. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099505139</link><pubDate>Sun, 19 Jan 2025 11:53:47 -0000</pubDate><title>Re: Trusting the new router</title><guid isPermaLink="false">2099505139@Uncensored</guid><description><![CDATA[<html><body>

<p>Even lower than bottom..  considering the CPU In some of the commodity routers are worse than an RPI. </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099505093</link><pubDate>Sun, 19 Jan 2025 02:03:34 -0000</pubDate><title>Re: Trusting the new router</title><guid isPermaLink="false">2099505093@Uncensored</guid><description><![CDATA[ > I've considered doing this, but I figured routing in software would   
 
 >have a noticable impact. Maybe not, though. With my setup, I spend 99% 
   
 >of my time in a VM where the host is performing routing, and it doesn't
   
 >seem to bother me there.     
 >     
 >    
    
 Your CPU has to be very bottom of the barrel for you to notice if you are
routing domestic LAN traffic.   
  
 Pro-routers need to move harder traffic so they resort to tricks that does
not require as much traffic to go through the CPU. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099505077</link><pubDate>Sat, 18 Jan 2025 23:47:49 -0000</pubDate><title>Re: Trusting the new router</title><guid isPermaLink="false">2099505077@Uncensored</guid><description><![CDATA[ > 2025-01-18 15:55 from IGnatius T Foobar <ajc@citadel.org>   
 >Subject: Re: Trusting the new router  
 >It's not all that uncommon.  I ran my home network without a "real  
 >router" for the first 17 years (1996 through 2011).  My main server  
 >had a local network connection and an Internet connection and passed  
 >traffic between them.  In the 1990s this design pattern was more  
 >common than you might imagine today.  Eventually I switched to a  
 >consumer grade router.  A lot of people are still enthusiastic about  
 >building their own routers, using VyOS or OpenWRT or pfSense or  
 >whatever.  Some will even just drop a Linux machine across both  
 >networks and run iptables etc. by hand, which I've also done from  
 >time to time.   
 >  
 >There's no wrong answer.  You decide where you want to spend your  
 >time and what makes you happy.  
 >  
  
 I've considered doing
this, but I figured routing in software would have a noticable impact. Maybe
not, though. With my setup, I spend 99% of my time in a VM where the host
is performing routing, and it doesn't seem to bother me there. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099505063</link><pubDate>Sat, 18 Jan 2025 23:38:23 -0000</pubDate><title>Re: Trusting the new router</title><guid isPermaLink="false">2099505063@Uncensored</guid><description><![CDATA[<html><body>

<p>I donno, the last one i had, was "push button" and it was fine for 8+ years and cost me like 50 bucks.   It gave me NAT, routed ports, reserved addresses. 6G WiFI.. it 'just worked'  ( and 1G ports so fast enough for me )</p>
<p>The new one, donno yet, i did get it ready, including all my IP/MAC reservations but not taken the time to take it out back and install it since its been chilly, a foot of snow, and the other started working ok again after the last power cycle. ( long story i have told before, weather matters unless its 'critical'  as that part of the house is 'outside access', at least until i get the energy to tear down a wall in the utility room and extend it out to this 'isolated room' thing )</p>
<blockquote>
<div class="message_header"><span>Sat Jan 18 2025 21:54:01 UTC</span> <span>from <a href="do_template?template=user_show?who=darknetuser">darknetuser</a> </span> <span class="message_subject">Subject: Re: Trusting the new router</span></div>
<div class="message_content">
<div class="fmout-JUSTIFY">
<blockquote>  <br /><br /></blockquote>
<br />It is not about fun. It is about having good service. I tend to go the manual way because otherwise you have crap service. Fun is just a bonus. </div>
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099505058</link><pubDate>Sat, 18 Jan 2025 21:54:01 -0000</pubDate><title>Re: Trusting the new router</title><guid isPermaLink="false">2099505058@Uncensored</guid><description><![CDATA[ > 2025-01-18 17:37 from Nurb432   
 >Subject: Re: Trusting the new router  
 >Ya i have done it all at one point too.    
 >  
 >But its not 'fun'.. anymore. I just want to push a button and it  
 >work.  Its just a router..   
 >  
  
 It is not about fun. It is about having good service. I tend to go the manual
way because otherwise you have crap service. Fun is just a bonus. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099505045</link><pubDate>Sat, 18 Jan 2025 17:37:57 -0000</pubDate><title>Re: Trusting the new router</title><guid isPermaLink="false">2099505045@Uncensored</guid><description><![CDATA[<html><body>

<p>Ya i have done it all at one point too. </p>
<p>But its not 'fun'.. anymore. I just want to push a button and it work.  Its just a router.. </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099505041</link><pubDate>Sat, 18 Jan 2025 15:55:32 -0000</pubDate><title>Re: Trusting the new router</title><guid isPermaLink="false">2099505041@Uncensored</guid><description><![CDATA[<html><body>

<p>It's not all that uncommon.  I ran my home network without a "real router" for the first 17 years (1996 through 2011).  My main server had a local network connection and an Internet connection and passed traffic between them.  In the 1990s this design pattern was more common than you might imagine today.  Eventually I switched to a consumer grade router.  A lot of people are still enthusiastic about building their own routers, using VyOS or OpenWRT or pfSense or whatever.  Some will even just drop a Linux machine across both networks and run iptables etc. by hand, which I've also done from time to time.</p>
<p>There's no wrong answer.  You decide where you want to spend your time and what makes you happy.</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099504635</link><pubDate>Thu, 16 Jan 2025 01:44:50 -0000</pubDate><title>Re: Trusting the new router</title><guid isPermaLink="false">2099504635@Uncensored</guid><description><![CDATA[<html><body>

<p>No. Just getting tired of it all to be honest. My entire life i have 'done it myself'   ( see the hot rod and home handyman rooms for more on that.. )</p>
<blockquote>
<div class="message_header"><span>Thu Jan 16 2025 00:33:02 UTC</span> <span>from <a href="do_template?template=user_show?who=zelgomer">zelgomer</a> </span> <span class="message_subject">Subject: Re: Trusting the new router</span></div>
<div class="message_content">
<div class="fmout-JUSTIFY">What exactly does this mean, btw? Were you writing router firmware? </div>
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099504621</link><pubDate>Thu, 16 Jan 2025 00:33:02 -0000</pubDate><title>Re: Trusting the new router</title><guid isPermaLink="false">2099504621@Uncensored</guid><description><![CDATA[ > 2025-01-12 12:25 from Nurb432 <nurb432@uncensored.citadel.org>   
 >Subject: Re: Trusting the new router  
 >Few years ago id just roll my own. But getting tired.    
  
 What exactly does this mean, btw? Were you writing router firmware? 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099504588</link><pubDate>Wed, 15 Jan 2025 18:34:12 -0000</pubDate><title>Re: Trusting the new router</title><guid isPermaLink="false">2099504588@Uncensored</guid><description><![CDATA[ > 2025-01-12 12:25 from Nurb432     
 >Subject: Re: Trusting the new router    
 >Few years ago id just roll my own. But getting tired.      
    
 Then just buy non-consumer grade networking hardware.   
  
 You can buy old stuff from dealers and still have a better experience with
it than running new consumer grade equipment. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099504537</link><pubDate>Wed, 15 Jan 2025 11:43:31 -0000</pubDate><title>Re: Batman-model WiFi routers</title><guid isPermaLink="false">2099504537@Uncensored</guid><description><![CDATA[<html><body>

<p>Nah they have zero interest in me.  The only capture of my data is side-noise.</p>
<blockquote>
<div class="message_header"><span>Wed Jan 15 2025 01:19:03 UTC</span> <span>from <a href="do_template?template=user_show?who=zelgomer">zelgomer</a> </span> <span class="message_subject">Subject: Re: Batman-model WiFi routers</span></div>
<div class="message_content">
<div class="fmout-JUSTIFY">
<blockquote>To be honest, i'm less worried about the Chinese watching me than the <br />NSA. I am of zero interest to the CCP as i have no money, influence </blockquote>
<br />Sorry to tell you, they're likely the same. Or at the very least there is probably cross talk. </div>
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099504501</link><pubDate>Wed, 15 Jan 2025 01:19:03 -0000</pubDate><title>Re: Batman-model WiFi routers</title><guid isPermaLink="false">2099504501@Uncensored</guid><description><![CDATA[ >To be honest, i'm less worried about the Chinese watching me than the  
 >NSA. I am of zero interest to the CCP as i have no money, influence  
  
 Sorry to tell you, they're likely the same. Or at the very least there is
probably cross talk. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099504307</link><pubDate>Sun, 12 Jan 2025 23:52:19 -0000</pubDate><title>Re: Trusting the new router</title><guid isPermaLink="false">2099504307@Uncensored</guid><description><![CDATA[ > My policy is to not trust consumer-grade networking equipment. Quite 
 >often you can tell it comes with ok hardware, but they can't bother 
 >putting together decent firmware for it. 
 
 More and more it's just a system-on-chip with something close to the reference
design implemented around it.  There's no way every vendor is going to just
write a custom operating system so they just take something off the shelf
and put their vendor skin on it.  I guess that's what makes it relatively
easy to replace the firmware.
 
 I'm a big fan of VyOS and I even like it better than a regular Linux image.
 I would like to run it at home but I have Mikrotik access points and their
controller software is built into their router software so I am sticking with
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099504281</link><pubDate>Sun, 12 Jan 2025 12:25:05 -0000</pubDate><title>Re: Trusting the new router</title><guid isPermaLink="false">2099504281@Uncensored</guid><description><![CDATA[<html><body>

<p>Few years ago id just roll my own. But getting tired. </p>
<blockquote>
<div class="message_header"><span>Sun Jan 12 2025 11:00:35 UTC</span> <span>from <a href="do_template?template=user_show?who=darknetuser">darknetuser</a> </span> <span class="message_subject">Subject: Trusting the new router</span></div>
<div class="message_content">
<div class="fmout-JUSTIFY"><br />My policy is to not trust consumer-grade networking equipment. Quite often you can tell it comes with ok hardware, but they can't bother putting together decent firmware for it. </div>
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099504266</link><pubDate>Sun, 12 Jan 2025 11:00:35 -0000</pubDate><title>Trusting the new router</title><guid isPermaLink="false">2099504266@Uncensored</guid><description><![CDATA[ > 2025-01-09 00:01 from Nurb432   
 >New router at home this week.  Old one is getting flaky and i  
 >bought it in 2018 i guess, so time to retire it. This new one,  
 >aside from an annoyance on the WiFi options, and it has monster  
 >antennas sticking out all over it like something out of a batman  
 >movie, has built in openvpn and wireguard servers, and client of  
 >some sort. I wonder if i should trust it and ditch my 2 VMs that  
 >are doing that now.  
 >  
  
 My policy is to not trust consumer-grade networking equipment. Quite often
you can tell it comes with ok hardware, but they can't bother putting together
decent firmware for it. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099504072</link><pubDate>Thu, 09 Jan 2025 23:51:47 -0000</pubDate><title>Re: Batman-model WiFi routers</title><guid isPermaLink="false">2099504072@Uncensored</guid><description><![CDATA[<html><body>

<p>Its a TP-link. I forget the model without going and looking.  its a WiFi 6 thing. </p>
<p>To be honest, i'm less worried about the Chinese watching me than the NSA. I am of zero interest to the CCP as i have no money, influence or secrets, but as i wont follow agenda i am of interest to the US government. Not being a target is one reason it didn't bother me to buy Chinese phones for many years ( they didn't have all the carrier crap, and were 1/4 the price for the same feature set, so it was a practical win ).</p>
<p>I was meaning trust more in the sense of just trusting the thing is going go work, and not go wacko on me or just do stupid stuff and be unstable.  Purely from the technical standpoint.</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099504070</link><pubDate>Thu, 09 Jan 2025 23:03:40 -0000</pubDate><title>Re: Batman-model WiFi routers</title><guid isPermaLink="false">2099504070@Uncensored</guid><description><![CDATA[Heh.  That depends on the router, I guess.  :)  If it's a TP-Link or Huawei
router, then you're already screwed in many different ways.  I did move my
Wireguard VPN from a VM to my Mikrotik router when they finally added Wireguard
to RouterOS 7.0, but I'm comfortable with that for two reasons:
 
 1. I trust the Latvians more than I trust the Chinese.
 2. My VPN exists to check a box that says "Yes I used a VPN, I followed the
rules, so leave me alone" rather than to provide a particular level of privacy.
 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099504038</link><pubDate>Thu, 09 Jan 2025 17:04:26 -0000</pubDate><title>Batman-model WiFi routers</title><guid isPermaLink="false">2099504038@Uncensored</guid><description><![CDATA[ >some sort. I wonder if i should trust it and ditch my 2 VMs that  
 >are doing that now.  
  
 No. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099503962</link><pubDate>Thu, 09 Jan 2025 00:01:10 -0000</pubDate><title>Message #2099503962</title><guid isPermaLink="false">2099503962@Uncensored</guid><description><![CDATA[<html><body>

<p>New router at home this week.  Old one is getting flaky and i bought it in 2018 i guess, so time to retire it. This new one, aside from an annoyance on the WiFi options, and it has monster antennas sticking out all over it like something out of a batman movie, has built in openvpn and wireguard servers, and client of some sort. I wonder if i should trust it and ditch my 2 VMs that are doing that now.</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099494591</link><pubDate>Sat, 26 Oct 2024 18:25:07 -0000</pubDate><title>Message #2099494591</title><guid isPermaLink="false">2099494591@Uncensored</guid><description><![CDATA[That was my conclusion too, after breaking in to the looping sessions with
a debugger and learning where it was stuck.  But I wasn't able to reproduce
it.  Fixed it anyway, so that's ok. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099494304</link><pubDate>Thu, 24 Oct 2024 14:55:43 -0000</pubDate><title>Message #2099494304</title><guid isPermaLink="false">2099494304@Uncensored</guid><description><![CDATA[ > More recently, they started slamming port 23 (telnet).  And I found a 
 
 >bug in the Citadel client that made it go into an active loop while   
 >detecting the terminal capabilities if the client had already   
 >disconnected.  I'm not sure why, since telnetd ought to detect that   
 >condition and send a SIGHUP to the program and make it terminate.  
  
 If the client just silently drops off the net without sending FIN/RST, and
TCP keepalives are not enabled, telnetd will not know the connection is gone.
But I'm unclear if that's what happened here. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099488264</link><pubDate>Mon, 09 Sep 2024 17:43:33 -0000</pubDate><title>Message #2099488264</title><guid isPermaLink="false">2099488264@Uncensored</guid><description><![CDATA[In case anyone is curious about the problem we used to have with random chinese
crime factories taking up all of the connection slots here and keeping legitimate
users from logging in... 
  
 The first round was won a few months ago, when I discovered that they were
actually holding open the ports that immediately go encrypted (IMAPS, POP3S,
SMTPS, etc).  There was, and possibly still is, an issue that happens when
they open the port and then don't do anything with it, possibly disconnecting,
while the server is expecting to negotiate TLS.  I think I still need to do
some more work on cleaning up that condition, but for now I just shut the
ports off completely.  All of those protocols have STARTTLS commands available
on their normal port numbers, and that's what everyone uses anyway. 
  
 More recently, they started slamming port 23 (telnet).  And I found a bug
in the Citadel client that
made it go into an active loop while detecting the terminal capabilities if
the client had already disconnected.  I'm not sure why, since telnetd ought
to detect that condition and send a SIGHUP to the program and make it terminate.
 Suddenly I was finding a dozen clients consuming 100% CPU every time I logged
in.  So I rewrote the loop and it's better now. 
  
 We really ought to nuke china off the map.  I'm tired of them doing this
to our Internet. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099485134</link><pubDate>Fri, 16 Aug 2024 22:04:38 -0000</pubDate><title>Message #2099485134</title><guid isPermaLink="false">2099485134@Uncensored</guid><description><![CDATA[<html><body>

<p>Well, that was fun.</p>
<p>Didn't make it to the office Monday like i thought so plans to test there fell thru.</p>
<p>Went ahead and set it auto connect to my phone then took the phone out to the back yard in the shade to get just enough signal to work. Grabbed a battery for the device and stuck it out there in the shade too..Ran back in the house, nope its not connecting.  Brought it back in, hit the console and it wasn't resolving the host name for my server. Really odd. The hotspot must be blocking normal DNS servers or something, i donno. So just stuck it in the hosts file, reboot and it was fine. yay.   </p>
<p>Then i noticed the storage drive was not being seen.. ( 1TB mini size m.2, 2242 i think? i forget the numbers ). Puled it apart, and the case was literally melted slightly.. Its toast.  Seems others have had the same problem, this stupid ass board eats m.2  SSDs for lunch.</p>
<blockquote>
<div class="message_header"><span>Sun Aug 11 2024 12:57:07 EDT</span> <span>from <a href="do_template?template=user_show?who=IGnatius T Foobar">IGnatius T Foobar</a> </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY">So did you get it to work? Wireguard's ability to punch through firewalls using the traditional UDP semantics is excellent. <br /><br />It is interesting that UDP has become quite popular in recent years. HTTP 3.0 uses it, Wireguard uses it, mosh uses it ... seems like everyone's got a TCP replacement these days. </div>
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099484315</link><pubDate>Sun, 11 Aug 2024 21:05:21 -0000</pubDate><title>Message #2099484315</title><guid isPermaLink="false">2099484315@Uncensored</guid><description><![CDATA[<html><body>

<p>Up to the point of taking it somewhere to test.   While what i did is pretty close to being 'remote' ... i still want to test.</p>
<p> </p>
<p>Might be in the office Monday for managers meeting,if so ill drag it along with me and do tethering off my phone since i actually get signal there and don't need to make a special trip. Can set it to auto connect so i wont need console access to the thing if i try some random wifi... ( of course might be in the office staring next month on a regular basis :( )</p>
<blockquote>
<div class="message_header"><span>Sun Aug 11 2024 12:57:07 EDT</span> <span>from <a href="do_template?template=user_show?who=IGnatius T Foobar">IGnatius T Foobar</a> </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY">So did you get it to work? Wireguard's ability to punch through firewalls using the traditional UDP semantics is excellent. <br /><br />It is interesting that UDP has become quite popular in recent years. HTTP 3.0 uses it, Wireguard uses it, mosh uses it ... seems like everyone's got a TCP replacement these days. </div>
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099484301</link><pubDate>Sun, 11 Aug 2024 16:57:07 -0000</pubDate><title>Message #2099484301</title><guid isPermaLink="false">2099484301@Uncensored</guid><description><![CDATA[So did you get it to work?  Wireguard's ability to punch through firewalls
using the traditional UDP semantics is excellent. 
  
 It is interesting that UDP has become quite popular in recent years.  HTTP
3.0 uses it, Wireguard uses it, mosh uses it ... seems like everyone's got
a TCP replacement these days. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099483408</link><pubDate>Sun, 04 Aug 2024 17:51:54 -0000</pubDate><title>Message #2099483408</title><guid isPermaLink="false">2099483408@Uncensored</guid><description><![CDATA[<html><body>

<p>to  me i think 'server' = the one i have to open endpoints on. When you said 'server at friends', that was what i was thinking.</p>
<p>Not real sure what a good value is for keep alive, figured that its a good idea no matter what unless i was trying to hide it.  Their example showed 25, and it worked here. So unless that is a 'bad' number ill just leave it at that.</p>
<blockquote>
<div class="message_header"><span>Sun Aug 04 2024 13:38:05 EDT</span> <span>from <a href="do_template?template=user_show?who=darknetuser">darknetuser</a> </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY">
<blockquote>2024-08-03 15:29 from Nurb432 <br />client is at friends.  no way i can open ports.  </blockquote>
<br />It makes no difference. ONly one of the endpoints needs a wireguard port to be reachable. In this case it has to be your big badass router at your home. <br /><br />You may need to set a sane keepalive for the connection to survive through NAT if your friend's NAT is just sucky. </div>
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099483406</link><pubDate>Sun, 04 Aug 2024 17:38:05 -0000</pubDate><title>Message #2099483406</title><guid isPermaLink="false">2099483406@Uncensored</guid><description><![CDATA[ > 2024-08-03 15:29 from Nurb432     
 >client is at friends.  no way i can open ports.      
    
 It makes no difference. ONly one of the endpoints needs a wireguard port
to be reachable. In this case it has to be your big badass router at your
home.   
  
 You may need to set a sane keepalive for the connection to survive through
NAT if your friend's NAT is just sucky. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099483348</link><pubDate>Sat, 03 Aug 2024 20:36:03 -0000</pubDate><title>Message #2099483348</title><guid isPermaLink="false">2099483348@Uncensored</guid><description><![CDATA[<html><body>

<p>Did have to add keepalive this time.  Client kept dropping after a while. Might have last time too, but i didn't leave it for long, kept beating on it.</p>
<p>Not like im trying to hiding the client, so not a big deal in the bigger picture.</p>
<p> </p>
<p>Guess its time to load the actual hardware, figure out the best way to test it without having to drive anywhere.  ( if i had cell signal here, be easy, just go wireless off that for testing but no, have to drive to the local park and if i do that, might as well drive 2x to somewhere that has actual wifi. ).   I guess i could setup a PC with external VPN, hang it off a 2nd router bla bla bla.   </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099483325</link><pubDate>Sat, 03 Aug 2024 19:29:10 -0000</pubDate><title>Message #2099483325</title><guid isPermaLink="false">2099483325@Uncensored</guid><description><![CDATA[<html><body>

<p>client is at friends.  no way i can open ports. </p>
<blockquote>
<div class="message_header"><span>Sat Aug 03 2024 14:55:29 EDT</span> <span>from <a href="do_template?template=user_show?who=darknetuser">darknetuser</a> </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY"><br />Home system in LAN 1 &lt;&gt; big badass router &lt;&gt; WAN &lt;&gt;lame router fromfriend's house &lt; server at friend's LAN <br /><br />. </div>
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099483324</link><pubDate>Sat, 03 Aug 2024 19:22:41 -0000</pubDate><title>Message #2099483324</title><guid isPermaLink="false">2099483324@Uncensored</guid><description><![CDATA[<html><body>

<p>Still waiting for my file restore... so took a few minutes to set stuff up again.</p>
<p>i'm back where i was before i started mucking around with the confg files more.</p>
<p>Server running.  Client connects, cant access my network OR the outside...  But i can ssh from server to it. So it will do the job.    </p>
<p>Ill snapshot both and mess with the configs later see if can at least get the client to hit the internet.  ( might want to do OS updates someday and not drive out to do it )</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099483321</link><pubDate>Sat, 03 Aug 2024 18:55:29 -0000</pubDate><title>Message #2099483321</title><guid isPermaLink="false">2099483321@Uncensored</guid><description><![CDATA[ > 2024-08-03 09:11 from Nurb432             
 >That is part of the problem i don't have any access to mess with       
    
 >the remote network. it has to be 100% transparent.  if i could        
   
 >screw with their network it would be a lot easier, id just open        
   
 >a port and 'dial in' directly.             
 >            
            
 Alright, then I take your scenario is:           
          
 Home system in LAN 1 <> big badass router <> WAN <>lame router fromfriend's
house < server at friend's LAN         
        
 In that scenario:       
      
 Setup the bigbadass router to wireguard-peer with anybody with the proper
key . Set the IP at the wireguard interface of the big badass router to something
like 192.168.90.111.1. Create a route in the router so traffic to 192.168.111.2
is router through the wireguard interface.     
    
 Configure the server you re hosting
in the friend's network as usual. Then add a wireguard interface to it. Configure
that wireguard to peer with your big badass router only. Have its wireguard
interface have address 192.168.111.2 and give it routing tables that send
traffic to both your LAN and your 192.168.111.1 address over the wireguard
interface.   
  
 Assuming your friend's LAN is not 192.168.111.0/24 then you are done. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099483275</link><pubDate>Sat, 03 Aug 2024 13:14:26 -0000</pubDate><title>Message #2099483275</title><guid isPermaLink="false">2099483275@Uncensored</guid><description><![CDATA[<html><body>

<p>I think this is what i did, and it sort of worked then fell apart.  But ill try it that way again. ( hard part is testing.. last time i was screwing with VPN + VMs to get it off my network to test with, with intent to replicate it on the 'box'..  cell signal is too low here to tether )</p>
<blockquote>
<div class="message_header"><span>Fri Aug 02 2024 21:18:38 EDT</span> <span>from <a href="do_template?template=user_show?who=darknetuser">darknetuser</a> </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY">
<blockquote>New use case: <br />* Setup server at home. ( easy ) <br />*snip*</blockquote>
<br />Easy. Your home needs a static IP. Configure your home wireguard enpoint to accept a peer with a given key from address 0.0.0.0 (all addresses). <br /><br />Then you configure the drop-in in your friend's house to peer with your home with address $YOURHOME. You may need to play with the keepalive settings in order to pass through botched NAT systems at your riend's house, though. </div>
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099483274</link><pubDate>Sat, 03 Aug 2024 13:11:18 -0000</pubDate><title>Message #2099483274</title><guid isPermaLink="false">2099483274@Uncensored</guid><description><![CDATA[<html><body>

<p>That is part of the problem i don't have any access to mess with the remote network. it has to be 100% transparent.  if i could screw with their network it would be a lot easier, id just open a port and 'dial in' directly.</p>
<p> </p>
<p>( and no, im not secretly stealing network access... its a 'hey, can you plug this in for me and just walk away' situation. )</p>
<blockquote>
<div class="message_header"><span>Fri Aug 02 2024 21:13:58 EDT</span> <span>from <a href="do_template?template=user_show?who=darknetuser">darknetuser</a> </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY"><br />You need routing rules on both routers to allow LAN1 to see LAN2 and the other way around. </div>
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099483201</link><pubDate>Sat, 03 Aug 2024 01:18:38 -0000</pubDate><title>Message #2099483201</title><guid isPermaLink="false">2099483201@Uncensored</guid><description><![CDATA[ >New use case:      
 > * Setup server at home. ( easy )     
 > * Drop remote device at a friend for family house. ( a bit of a    
 >drive, but that is the point )     
 > * May have to move it on a regular basis     
 > * i have no control over remote network. just drop and go.     
 > * Remote device connects back here automatically ( easy )     
 > * Using rsync ( either via ssh or direct network, like via NFS    
 >) to backup local files out to the remote device.  ( rsync so    
 >its always deltas..)     
    
 Easy. Your home needs a static IP. Configure your home wireguard enpoint
to accept a peer with a given key from address 0.0.0.0 (all addresses).  

  
 Then you configure the drop-in in your friend's house to peer with your home
with address $YOURHOME. You may need to play with the keepalive settings in
order to pass through botched NAT systems at your riend's house, though. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099483200</link><pubDate>Sat, 03 Aug 2024 01:13:58 -0000</pubDate><title>Message #2099483200</title><guid isPermaLink="false">2099483200@Uncensored</guid><description><![CDATA[ > * The wireguard subnet config: should it be the same as my home       
      
 >subnet or unique.   ?  ( i was trying to get the remote             

 >devices to be ON my network last time. i gave up on that part as       
      
 >it was a mess )               
 > * assuming its not my home net, and I cant predict the remote         
    
 >subnet, so not sure what a good one to use that no other home          
   
 >router might use by default so it wont conflict at their              
 >place.                
 > * Can the remote devices attach to devices on my network or is        
     
 >it just an internet pipe only. ( i remember getting that to            
 
 >work, forget how)               
 > * if its on my subnet, could i ssh/sftp into one of the remote        
     
 >devices, or do i need to change the routing rules on the remote        
     
 >device?              

 > * If its not on my subnet, could i still ssh(SFTP really) from        
     
 >the local server back into one of the devices, or is that yet          
   
 >more 'special config'               
              
            
 Too long of a post so I will tackle these first:           
          
 Simple scenario for a site-to site:         
        
 LAN1 (192.168.10.0/24) <>router1<> WIREGUARD INTERFACE 1 (192.168.100.1)<>wan
      
 <>WIREGUARD INTERFACE 2 (192.168.100.2)<>router2<>LAN 2(192.168.20.0/24)
      
      
 There are ways to have the same LAN on both ends by bridging layer 2 traffic
but for a home lab  it makes no sense. JUst add static routers in your routers
so traffic from LAN 1 can reach LAN2 and the other way around, and you are
golden.     
    
 Devices in LAN 1 will interct with devices in LAN2 just as if there was no
WAN between both routers and just as if LAN 1 and
LAN2 were separated with a single router.   
  
 You need routing rules on both routers to allow LAN1 to see LAN2 and the
other way around. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099483182</link><pubDate>Fri, 02 Aug 2024 21:35:44 -0000</pubDate><title>Message #2099483182</title><guid isPermaLink="false">2099483182@Uncensored</guid><description><![CDATA[<html><body>

<p>Oh and for worst case,  i could always use openvpn i know, as it would let me access local devices out of the box.   but was hoping to not have to go with 'automated reach down' if i could pull it off. </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099483175</link><pubDate>Fri, 02 Aug 2024 21:15:43 -0000</pubDate><title>Message #2099483175</title><guid isPermaLink="false">2099483175@Uncensored</guid><description><![CDATA[<html><body>

<p>Ok so going to start back up playing with wireguard. last time it didn't go well ( for my original use case.. so i modified it somewhat ). Losing a drive this week, and the bad weather ( with tornadoes again ) has made me want to tackle it again.</p>
<p>I know its not hard, and was trivial to get the basics running last time too, but im lazy so going to use the config generator at https://www.wireguardconfig.com/  as a starting point  ( for phones, it creates a nice QR code for you... which was neat  )</p>
<p>But  related to troubles i had before, trying to do fancy stuff , so using just 'basic' configs couple of questions :( and i forget how much i tried and didn't try and screwed around with at this point, it was several days before i threw in the towel and punted )</p>
<p> </p>
<ul>
<li>The wireguard subnet config: should it be the same as my home subnet or unique.   ?  ( i was trying to get the remote devices to be ON my network last time. i gave up on that part as it was a mess )</li>
<li>assuming its not my home net, and I cant predict the remote subnet, so not sure what a good one to use that no other home router might use by default so it wont conflict at their place. </li>
<li>Can the remote devices attach to devices on my network or is it just an internet pipe only. ( i remember getting that to work, forget how)</li>
<li>if its on my subnet, could i ssh/sftp into one of the remote devices, or do i need to change the routing rules on the remote device?</li>
<li>If its not on my subnet, could i still ssh(SFTP really) from the local server back into one of the devices, or is that yet more 'special config'</li>
</ul>
<p> </p>
<p> </p>
<p>New use case:</p>
<ul>
<li>Setup server at home. ( easy )</li>
<li>Drop remote device at a friend for family house. ( a bit of a drive, but that is the point )</li>
<li>May have to move it on a regular basis</li>
<li>i have no control over remote network. just drop and go.</li>
<li>Remote device connects back here automatically ( easy )</li>
<li>Using rsync ( either via ssh or direct network, like via NFS ) to backup local files out to the remote device.  ( rsync so its always deltas..)</li>
</ul>
<p>Optionally</p>
<ul>
<li>restore files from remote site instead of driving out ( but may be moot, if im restoring from there, my house is most likely gone anyway.. )</li>
</ul>
<p>Really dont care if i have to run it all from the server, or directly from my network ( the original plan that blew up on me ). Dont care if its automated or i type commands. </p>
<p> </p>
<p>Worst case</p>
<ul>
<li>i have no control over the device, so a cron job to rsync on remote device to reach down grab from local folders on its own.   Drive out to restore in disaster situation </li>
</ul>
<p> </p>
<p> </p>
<p> </p>
<p> </p>
<p> </p>
<p> </p>
<p> </p>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099476037</link><pubDate>Mon, 17 Jun 2024 12:16:12 -0000</pubDate><title>Message #2099476037</title><guid isPermaLink="false">2099476037@Uncensored</guid><description><![CDATA[<html><body>

<p>Still reading the details but seems cloud-flare will stop hosting an IPFS gateway and now its going to be 'transferred' to something called " interplanetary shipyard " Something fairly new it seems, and somehow tied to the IPFS project.</p>
<p>While it was nice that cloud-flare was offering bandwidth 'to the cause', they were also blocking addresses on demand, both for IPFS and Etherium..  Scumbag *ers. So it might be a good change. ( or worse, donno yet )</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099473816</link><pubDate>Thu, 30 May 2024 15:38:19 -0000</pubDate><title>Message #2099473816</title><guid isPermaLink="false">2099473816@Uncensored</guid><description><![CDATA[<html><body>

<p>For the guy asking about firewalld</p>
<p> </p>
<p>https://www.redhat.com/sysadmin/how-to-configure-firewalld</p>
<p> </p>
<p>( disclaimer: i dont use it. I dont even have a firewall enabled on my servers. Only 2 ports are open on my external facing router and I have a upstream ngnix proxy that does all the incoming for me.</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099466015</link><pubDate>Thu, 25 Apr 2024 02:24:37 -0000</pubDate><title>Android sucks at IPv6 with wifi - here&#39;s how to fix it</title><guid isPermaLink="false">2099466015@Uncensored</guid><description><![CDATA[ 
  
 Anyone who has spent time trying to get Android to work properly with IPv6
on a wifi network knows how shitty their implementation is.  On a mobile network
it's rock solid; on WiFi it's rubbish.  It's also widely known that the Android
developers stubbornly refuse to implement DHCPv6, relying instead on SLAAC
to acquire an address, router, and DNS.  This by itself is not so bad, except
their implementation of *that* is garbage too. 
  
 Ever since setting up IPv6 at home I've had a problem on some of our Android
devices where it will acquire an IPv6 address, then some time later it will
"lose" it.  Web sleuthing provided no clues until I eventually realized that
the device wasn't actually losing its address; it was just losing its default
route, at which point it would simply fall back to IPv4. 
  
 So it turns out that some versions of Android (including ones that ought
to be recent
enough to know better) discard a lot of broadcast packets when the screen
is turned off -- including Router Advertisements.  So what happens is, you
turn on wifi, you get an address and a route from a Solicited RA, then later
on when the screen is off, that RA expires.  It's also too stupid to solicit
a new RA when it wakes up. 
  
 The workaround is to configure your router's RA Interval as LOW as possible
(mine is 5 to 10 seconds) and the RA Lifetime as HIGH as possible (mine is
9000 seconds).  The reason this works is that Android doesn't drop ALL broadcast
frames when the screen is off, only some of them.  So by having an RA broadcasting
ever 5 to 10 seconds, it becomes highly unlikely that every single one of
them in that 9000 second lifetime will be dropped. 
  
 I've had this configured for a couple of days now and my problem devices
are holding on to their IPv6 now. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099466010</link><pubDate>Thu, 25 Apr 2024 00:30:01 -0000</pubDate><title>Message #2099466010</title><guid isPermaLink="false">2099466010@Uncensored</guid><description><![CDATA[<html><body>

<p>I forget what room it started in, but did finally figure out what was causing network to collapse after running a VM or Docker container on a Debian workstation, but not server. At least in my case, ymmv for other people.</p>
<p>"connman"  remove that, fix what it added to the network config file that breaks when its removed... poof .. works.  it gets installed with lxde and a few other desktops.</p>
<p>To help with WiFi, i put in network-manager, has a console interface to scan/attach to APs. </p>
<p> </p>
<p>Im sure there are other fixes involving messing around with ip tables and routing and stuff, but that is a brain dead easy fix.</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099431561</link><pubDate>Thu, 11 Apr 2024 00:07:38 -0000</pubDate><title>Message #2099431561</title><guid isPermaLink="false">2099431561@Uncensored</guid><description><![CDATA[<html><body>

<p>lol</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099429823</link><pubDate>Wed, 10 Apr 2024 20:34:34 -0000</pubDate><title>Message #2099429823</title><guid isPermaLink="false">2099429823@Uncensored</guid><description><![CDATA[<html><body>

<p> </p>
<blockquote>
<div class="message_content">
<p>So that explains the tremors. </p>
</div>
</blockquote>
<p>Ok I just <em>must</em> share this story, since we are talking about networks and earthquakes.</p>
<p>Now you know I normally don't do tech support for anyone who isn't either sleeping with me or signing my paycheck (in other words, my wife and my boss can ask for computer help, everyone else can fuck off).  But I did build the network in our church building so I'll answer a call for help there, with the condition that it has to be a network problem -- no computer problems and <em>definitely</em> no printer problems.  As we all know, the three words that repulse tech people the most are "I can't print."</p>
<p>But parts of the network were out, and it's my day off, so off I go.  It was a weird problem, the core network was good, the wifi was up, but parts of the network were out.  After some simple tracing I found the culprit: the earthquake had shaken the power cord loose from one of the switches upstairs.</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099383911</link><pubDate>Fri, 05 Apr 2024 20:20:24 -0000</pubDate><title>Message #2099383911</title><guid isPermaLink="false">2099383911@Uncensored</guid><description><![CDATA[<html><body>

<p>So that explains the tremors.  </p>
<blockquote>
<div class="message_header"><span>Fri Apr 05 2024 16:18:49 EDT</span> <span>from <a href="do_template?template=user_show?who=IGnatius T Foobar">IGnatius T Foobar</a> </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY"><br /><br />I ended up factory-resetting my router which solved most of the problems. <br /><br /></div>
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099383904</link><pubDate>Fri, 05 Apr 2024 20:18:49 -0000</pubDate><title>Message #2099383904</title><guid isPermaLink="false">2099383904@Uncensored</guid><description><![CDATA[I know that it hits a Google-operated site to determine whether the current
network "has Internet access" (so if it doesn't then you get the little exclamation
point next to the wifi icon).  But for local network it's got to be doing
something else. 
  
 I ended up factory-resetting my router which solved most of the problems.
 I also kept it with just one access point after realizing that the one in
my office can actually cover the whole house without difficulty.  Things seem
ok now.  Wifi is solid and all my local stuff works again.  But I still have
the problem where my Android loses its IPv6 default gateway after a while.

]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099379447</link><pubDate>Thu, 04 Apr 2024 11:06:40 -0000</pubDate><title>Message #2099379447</title><guid isPermaLink="false">2099379447@Uncensored</guid><description><![CDATA[<html><body>

<p>i suspect it hits an actual site, as the gateway could be up, but non functional. </p>
<p>Could it be interference and just coincidental timing ? </p>
<blockquote>
<div class="message_header"><span>Thu Apr 04 2024 00:43:51 EDT</span> <span>from <a href="do_template?template=user_show?who=IGnatius T Foobar">IGnatius T Foobar</a> </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY"><br />. Maybe it pings the gateway or something. </div>
</div>
</blockquote>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099379428</link><pubDate>Thu, 04 Apr 2024 04:43:51 -0000</pubDate><title>Message #2099379428</title><guid isPermaLink="false">2099379428@Uncensored</guid><description><![CDATA[  
 F***ing feh. 
  
 The whole family has been getting wifi dropouts ever since I upgraded my
Mikrotik h-EX to whatever software was current as of a couple of days ago.
 And today I noticed it too.  Wifi going in and out all over the place.  And
my IPv6 is gone.  Picks up a prefix and hands addresses out to clients but
doesn't forward.  And the web UI is also gone. 
  
 This Does Not Bode Well.  I need to have a ridiculously solid network when
I move my hosting stuff back home later this year. 
  
 I disabled CapsMan, removed all AP's except the centrally located one, and
turned it into a standalone AP.  Wifi is better, but not perfect.  And yes
I checked to make sure it wasn't just that AP crapping out, because I was
connected to a different one before. 
  
 Wondering how my phone decides the wifi network is out.  Maybe it pings the
gateway or something.  With the wifi down to one standalone
AP it's possible to try a different router.  I could press the NanoPi into
service for that role, since it's built for that sort of thing, but I don't
really want to give up my ARM development host.  I dunno ... guess I'll watch
it for a day or two and figure something out. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099378946</link><pubDate>Fri, 29 Mar 2024 17:36:43 -0000</pubDate><title>Message #2099378946</title><guid isPermaLink="false">2099378946@Uncensored</guid><description><![CDATA[<html><body>

<p>Ok, scratch the above. I tore both machines down, redid them. It works. i donno. Some days i hate computers. </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099378807</link><pubDate>Wed, 27 Mar 2024 18:36:08 -0000</pubDate><title>Message #2099378807</title><guid isPermaLink="false">2099378807@Uncensored</guid><description><![CDATA[<html><body>

<p>so a bit of frustration with my attempt at wireguard..</p>
<p> </p>
<p>use case:  now that my off-site backup plan is ruined. i thought about dropping off a tiny ARM box with a couple of TB storage at my brothers house. Have it auto connect to my network, and once a week or so do an RSYNC over ( with z... compress the data )</p>
<p>Trying not to be fancy, 'just enough' to get the job done. Cant ask for ports to be opened nor do i want to effect brothers network at all ( and it might move to another house at any point so has to be self-contained ), so I figured id use either openvpn or wireguard and reach out, not in.</p>
<p>Openvpn - setup is easy, i have a server now for when i travel. But getting things so i can get back into the remote device, not so easy.</p>
<p>Wireguard, got it setup using some 'easy wireguard docker image' ( wg-easy ) that has a gui that creates config files for you, even QR codes. It worked for incoming just fine and was pretty painless. Problem is that its docker, so again, getting back to my device would be a pain. Either screwing with networking in docker, or perhaps a shell in the container, bla bla. But it did at least connect and work.</p>
<p> </p>
<ul>
<li>Trying it on the bare OS using the below link.  I can only get it sort of working.</li>
<li>Server, starts, runs properly. Client, i can connect manually using wq-quick but not yet as a auto start service ( systemd..bleh, but i can figure that out later once network is right ). But cant seem to get it to be reachable on my network.  Only can access the client via the server, using ssh. If what im doing just isn't doable, i guess a double hop via server isn't end of world, just not as convenient ).  </li>
<li>If i follow directions exactly, and put both devices it on an unused subnet, i expect that to happen, but i also lose all connectivity out of the client, other than being able to ping the gateway..  Again, not end of world i as i 'could' use the server and ssh over.. but it should work.. it worked when i had the docker version of server going.</li>
<li>If i change the IPs to unused addresses on my normal subnet, its pretty much toast.</li>
</ul>
<p> </p>
<p>So i guess the real question is, with the above issues, is he missing some steps? Or am i just a dumbass and missing something obvious?</p>
<p> </p>
<p>Link im using -&gt; https://www.stavros.io/posts/how-to-configure-wireguard/</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099377450</link><pubDate>Thu, 14 Mar 2024 21:29:12 -0000</pubDate><title>Message #2099377450</title><guid isPermaLink="false">2099377450@Uncensored</guid><description><![CDATA[<html><body>

<p>Acidic?  I'm agreeing with you.  </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099377441</link><pubDate>Thu, 14 Mar 2024 20:56:05 -0000</pubDate><title>Message #2099377441</title><guid isPermaLink="false">2099377441@Uncensored</guid><description><![CDATA[ > Yeah, you could be a lillicluster whore like Jeff Geerling.  Or you   
 >could buy one computer with enough power to blow away the biggest   
 >pi-cluster.   
  
 You don't need to be acidic. My point is that a cluster-in-a-laptop is as
much cheating as a cluster with cheap SBCs :P 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099377434</link><pubDate>Thu, 14 Mar 2024 18:51:05 -0000</pubDate><title>Message #2099377434</title><guid isPermaLink="false">2099377434@Uncensored</guid><description><![CDATA[<html><body>

<p>Myself, if ( or when ) i was playing with cluster stuff to try a few things, id just do nested VMs on a larger host...   One cheap xeon would eat a room of PIs and be far easier to setup, break, tear down, rebuild, snapshot, bla bla etc.</p>
<p>Only reason id want to run a bunch of lower power would ARM boards would be for a true fault-tolerant ceph storage cluster.  Smallish ARM boards excel for that. ( tho id still not choose pi.. ech )  ok i guess there are 2 reasons.. the other is for the other use of cheap ARM ., embedded IoT.. but im more liable to use ESP32 instead these days.</p>
<p>And, im talking cheap ARM since RPI was brought up.  The high end, not throwaway cost stuff, of course i love for 'real' use, as everyone around here knows by now :) </p>
<blockquote>
<div class="message_header"><span>Thu Mar 14 2024 13:21:37 EDT</span> <span>from <a href="do_template?template=user_show?who=IGnatius T Foobar">IGnatius T Foobar</a> </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY">
<blockquote>I am sure I could build something with raspberries that would count as </blockquote>
<br />
<blockquote>a portable cluster. </blockquote>
<br />Yeah, you could be a lillicluster whore like Jeff Geerling. Or you could buy one computer with enough power to blow away the biggest pi-cluster. <br /><br />I know, I know, it's all proof of concept stuff. And for learning. And for whoring on YouBoob. In my case I don't care, I have access to a million dollar lab environment at work. My stuff is here to run actual workloads, and I'm going to do that as efficiently as I can. </div>
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099377424</link><pubDate>Thu, 14 Mar 2024 17:21:37 -0000</pubDate><title>Message #2099377424</title><guid isPermaLink="false">2099377424@Uncensored</guid><description><![CDATA[ > I am sure I could build something with raspberries that would count as
 
 >a portable cluster.   
  
 Yeah, you could be a lillicluster whore like Jeff Geerling.  Or you could
buy one computer with enough power to blow away the biggest pi-cluster. 
  
 I know, I know, it's all proof of concept stuff.  And for learning.  And
for whoring on YouBoob.  In my case I don't care, I have access to a million
dollar lab environment at work.  My stuff is here to run actual workloads,
and I'm going to do that as efficiently as I can. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099377421</link><pubDate>Thu, 14 Mar 2024 17:07:21 -0000</pubDate><title>Message #2099377421</title><guid isPermaLink="false">2099377421@Uncensored</guid><description><![CDATA[<html><body>

<p>ewwwww</p>
<blockquote>
<div class="message_header"><span>Thu Mar 14 2024 12:33:39 EDT</span> <span>from <a href="do_template?template=user_show?who=darknetuser">darknetuser</a> </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY">I am sure I could build something with raspberries </div>
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099377415</link><pubDate>Thu, 14 Mar 2024 16:33:39 -0000</pubDate><title>Message #2099377415</title><guid isPermaLink="false">2099377415@Uncensored</guid><description><![CDATA[ > You can carry a cluster around; all you need is a laptop running three
 
 >virtual machines with nested virt in which you run Proxmox and then   
 >build a cluster out of those...     hehe     
  
 I am sure I could build something with raspberries that would count as a
portable cluster. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099377395</link><pubDate>Thu, 14 Mar 2024 13:05:07 -0000</pubDate><title>Message #2099377395</title><guid isPermaLink="false">2099377395@Uncensored</guid><description><![CDATA[ > I just have my Proxmox cluster in a dedicated LAN into which I can VPN
 
 >everytime I need to. The clusters are a bit heavy to carry arround, but
 
  
 You can carry a cluster around; all you need is a laptop running three virtual
machines with nested virt in which you run Proxmox and then build a cluster
out of those...     hehe   
  
 (Well that's how you can test clustering anyway ... if you actually WANT
a cluster, then you need three laptops.) 
  
 In my case I just built this little server, it ended up on a shelf on the
network wall in the garage, and I kind of want to be able to "do computer
stuff" in that room.  Running a desktop in a partition that I can blow away
seems like a better idea than running it in the root. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099377322</link><pubDate>Wed, 13 Mar 2024 20:09:34 -0000</pubDate><title>Message #2099377322</title><guid isPermaLink="false">2099377322@Uncensored</guid><description><![CDATA[<html><body>

<p>Normally if i'm not at my house, id use VPN ( or guacamole ) to get to whatever i want.</p>
<p> </p>
<p>This as an odd ball edge-use case.  Was more relevant about the similar loss of network like docker, than the setup itself  :)</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099377314</link><pubDate>Wed, 13 Mar 2024 18:42:25 -0000</pubDate><title>Message #2099377314</title><guid isPermaLink="false">2099377314@Uncensored</guid><description><![CDATA[ >For what its worth - Reason i had the 'minimal desktop' on the host    
 >was so it was 100% standalone/portable, but with option to use PVE    
 >backup server across VPN. I can use the native browser to get    
 >spice/vnc sessions, remote Xterm, or just ssh, to access desktops in   

 >a vm. and the browser to manage the host. And no, i dont normally do   

 >that. This was an exception case as it needed to be portable and    
 >still have access to my backups, tho i have heard of people doing it   

 >on a regular basis. But i would think virt-manager + kvm would be    
 >better in most cases.      
    
 I just have my Proxmox cluster in a dedicated LAN into which I can VPN everytime
I need to. The clusters are a bit heavy to carry arround, but I can access
my stuff from anywhere so it is nearly as if I was carrying my virtual machines
with me.   
  
 That said, I have my own DNS
and TLS/Certs built for this stuff so I can reach my virtual (and real) machines
by name without having to think about it and for having a secure channel even
within the VPN (since I don't necessarily trust some of the network gear in
te infrastructure). 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099377312</link><pubDate>Wed, 13 Mar 2024 18:36:25 -0000</pubDate><title>Message #2099377312</title><guid isPermaLink="false">2099377312@Uncensored</guid><description><![CDATA[ > I'd be more interested in running a desktop environment inside an LXC 
 
 >container.  
 > Can you do that?  Yes I know, you're not supposed to do that, but I   
 >wonder if it's possible.   
 >   
 >  
  
 I am sure you can. I am not sure it makes sense. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099377217</link><pubDate>Tue, 12 Mar 2024 14:29:06 -0000</pubDate><title>Message #2099377217</title><guid isPermaLink="false">2099377217@Uncensored</guid><description><![CDATA[<html><body>

<p>I dont see why you couldn't.   I was going to try it before i posted an answer, but of course the damned network was hosed on the container i just created. ( grr! )  and i dont have time to f- with it.   Not sure 100% how the video would work on console, but you can always install xrdp, x2goserver ( my preference for remote desktop access ), or even VNC. </p>
<p>For what its worth - Reason i had the 'minimal desktop' on the host was so it was 100% standalone/portable, but with option to use PVE backup server across VPN. I can use the native browser to get spice/vnc sessions, remote Xterm, or just ssh, to access desktops in a vm. and the browser to manage the host. And no, i dont normally do that. This was an exception case as it needed to be portable and still have access to my backups, tho i have heard of people doing it on a regular basis. But i would think virt-manager + kvm would be better in most cases. </p>
<blockquote>
<div class="message_header"><span>Tue Mar 12 2024 09:04:57 EDT</span><span>from <a href="do_template?template=user_show?who=IGnatius T Foobar">IGnatius T Foobar</a></span></div>
<div class="message_header"><span style="background-color: transparent; font-size: 12px;"><br /></span></div>
<div class="message_header"><span style="background-color: transparent; font-size: 12px;">I'd be more interested in running a desktop environment inside an LXC container.</span></div>
</blockquote>
<blockquote>
<div class="message_content">
<div class="fmout-JUSTIFY">Can you do that? Yes I know, you're not supposed to do that, but I wonder if it's possible. </div>
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099377203</link><pubDate>Tue, 12 Mar 2024 13:04:57 -0000</pubDate><title>Message #2099377203</title><guid isPermaLink="false">2099377203@Uncensored</guid><description><![CDATA[ > Why would you install a desktop environment on a PVE Host? You are not
 
 >supposed to run services directly on the metal.   
  
 I'd be more interested in running a desktop environment inside an LXC container.
 Can you do that?  Yes I know, you're not supposed to do that, but I wonder
if it's possible. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099377202</link><pubDate>Tue, 12 Mar 2024 13:00:16 -0000</pubDate><title>Message #2099377202</title><guid isPermaLink="false">2099377202@Uncensored</guid><description><![CDATA[ >I also noticed if i install lxde on a PVE host it does the same  
 >thing, routing to the outside is hosed.. but not if i install xfce4.  
 >lxde has some extra network management stuff it installs..   a  
 >pattern at least.  
  
 On my machine, LXC containers are bridged to the host network on br0, br1,
and br2.  br0 is the untagged network.  When I installed Docker it created
a non-empty iptables configuration and LXC stopped working.  My workaround
for now is probably a bit too broad, but it works: 
  
 iptables -A FORWARD -i br0 -j ACCEPT 
 iptables -A FORWARD -o br0 -j ACCEPT 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099377104</link><pubDate>Mon, 11 Mar 2024 13:23:29 -0000</pubDate><title>Message #2099377104</title><guid isPermaLink="false">2099377104@Uncensored</guid><description><![CDATA[<html><body>

<p>its tempting just out of curiosity.  </p>
<p> </p>
<p> </p>
<p>Last week, Meta, LinkedIn, and Comcast all experienced outages lasting between 1-2 hours that impacted users’ abilities to access widely used apps and services, including Webex, Salesforce, and Amazon Web Services. Join our webinar tomorrow as our Internet experts will walk through these events as seen in the ThousandEyes platform. For each outage, we’ll cover:</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099376795</link><pubDate>Wed, 06 Mar 2024 12:22:42 -0000</pubDate><title>Message #2099376795</title><guid isPermaLink="false">2099376795@Uncensored</guid><description><![CDATA[<html><body>

<p>Standalone development machine.  Just enough to get a browser to work. </p>
<p>Yes, an exception, not a rule.</p>
<blockquote>
<div class="message_header"><span>Wed Mar 06 2024 04:16:46 EST</span> <span>from <a href="do_template?template=user_show?who=darknetuser">darknetuser</a> </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY">
<blockquote>I also noticed if i install lxde on a PVE host it does the same <br />thing, routing to the outside is hosed.. but not if i install xfce4. <br />lxde has some extra network management stuff it installs..   a <br />pattern at least. <br /><br /></blockquote>
<br />Why would you install a desktop environment on a PVE Host? You are not supposed to run services directly on the metal. </div>
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099376782</link><pubDate>Wed, 06 Mar 2024 09:16:46 -0000</pubDate><title>Message #2099376782</title><guid isPermaLink="false">2099376782@Uncensored</guid><description><![CDATA[ >I also noticed if i install lxde on a PVE host it does the same  
 >thing, routing to the outside is hosed.. but not if i install xfce4.  
 >lxde has some extra network management stuff it installs..   a  
 >pattern at least.  
 >  
  
 Why would you install a desktop environment on a PVE Host? You are not supposed
to run services directly on the metal. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099376670</link><pubDate>Mon, 04 Mar 2024 14:29:06 -0000</pubDate><title>Message #2099376670</title><guid isPermaLink="false">2099376670@Uncensored</guid><description><![CDATA[<html><body>

<p>What is odd, is i blew away the box last night.. Setup PVE on it so i could play with this on VMs to make it easier to work with. ( snapshots and such between me dinking around with stuff )</p>
<p>The first test VM is working like it should be.. grrrr      Well after i loaded the correct version of Debian on. seems i cant read.. i installed the previous version the first round and didnt notice until i tried to install it " bla bla library version isn't available..  DOH" . I keep an old ISO around just in case.. </p>
<p> </p>
<p>I also noticed if i install lxde on a PVE host it does the same thing, routing to the outside is hosed.. but not if i install xfce4. lxde has some extra network management stuff it installs..   a pattern at least.</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099376667</link><pubDate>Mon, 04 Mar 2024 14:19:50 -0000</pubDate><title>Message #2099376667</title><guid isPermaLink="false">2099376667@Uncensored</guid><description><![CDATA[I've not had that experience; it worked just fine for me wherever I've tried
it.  However -- it does set up a default container network in the 172.17.0.0
space.  So if you're using those addresses in your own network, it will make
them unreachable.  You can change the network it uses by editing /etc/docker/daemon.json
[https://tinyurl.com/3fbm3tku] and restarting.[   
  
  
 I personally prefer to set the default network to something unused and then
create my containers in a bridge network so they share the address space of
the underlying network.  The only problem is that they can communicate with
other containers and with the host network, but not with the host itself.
 Supposedly this was done deliberately to prevent rogue containers from breaking
out of their jails. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099376635</link><pubDate>Sun, 03 Mar 2024 19:16:04 -0000</pubDate><title>Message #2099376635</title><guid isPermaLink="false">2099376635@Uncensored</guid><description><![CDATA[ > 2024-03-02 13:41 from Nurb432       
 >Not a lot of details yet, but just today found out that if you      
 >install most current docker.ce on Debian ( and i think Ubuntu ) it     

 >modifies your routing and in the process kills internet access for     

 >your host. But local network still functions fine ( might kill DNS     

 >too, i have mine off my router so it still worked )       
      
 That is something that always irked me the wrong way about tools that deal
with namespaces. They don't isolate your application: they run the application
in a virtual environment with its own rules.     
    
 Which means if you have a firewall set up, and then start some application
inside of a firejail, you may latter discover that your firejailed application
has a different firewall configuration than the rest of the host because its
virtual environment comes with a wildly different configuration.
  
  
 I know it is not exactly the same case, but I can't stop noticing the similarities:
install some sandboxing tool, have the sandboxing cause unintended consequences
in your network configuration. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099376569</link><pubDate>Sat, 02 Mar 2024 18:41:12 -0000</pubDate><title>Message #2099376569</title><guid isPermaLink="false">2099376569@Uncensored</guid><description><![CDATA[<html><body>

<p>Not a lot of details yet, but just today found out that if you install most current docker.ce on Debian ( and i think Ubuntu ) it modifies your routing and in the process kills internet access for your host. But local network still functions fine ( might kill DNS too, i have mine off my router so it still worked )</p>
<p>Not just me, i see others asking what the hell is up too. </p>
<p>Not yet looked to see what is going on.. but removed it, and networking is back.  I guess now i have a task for Sunday.</p>
<p> </p>
<p>Grrrr</p>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099375087</link><pubDate>Sun, 11 Feb 2024 00:37:55 -0000</pubDate><title>Re: DynV6: dynamic DNS for IPv6 done right!</title><guid isPermaLink="false">2099375087@Uncensored</guid><description><![CDATA[Wireline providers seem to all delegate a /56 and simply don't do any DNS
at all.  Wireless providers are mandated to assign at least a /64 as mandated
by the 3GPP standards. 
  
 My prefix hasn't changed since I started using it, except at the very beginning
when I deliberately released it to see if I'd get the same one back the next
time (I didn't). 
  
 Other than that, residential access providers are doing the same thing for
IPv6 that they did for IPv4: your addresses are dynamic, there is no DNS integration,
and if you want static addresses you ought to be paying for commercial grade
service anyway. 
  
 The problem of course, is that it's troublesome to have your entire internal
network get renumbered when the prefix changes.  This means you could potentially
end up using NAT66, which is monumentally stupid, but at least you still get
a 1:1 Static NAT for each host instead of shoving
everything through a single address.  But it's still better than the dimbulbs
who run the network at ${dayjob} who thought it was a good idea to SNAT all
outbound IPv6 traffic through a single address.  They haven't figured out
that it's a bad idea to apply IPv4 practices to IPv6, that there's more to
IPv6 than simply a bigger address space.  These are the same dimbulbs who
think that it's fine to assign a /120 to a hosting network because it's the
same number of addresses as an IPv4 /24, and that's generous, right?  They
haven't figured out that SLAAC (1) *works* and (2) makes cloud scale deployment
easier to manage.  They're stuck in the data center of 2O011. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099375061</link><pubDate>Sat, 10 Feb 2024 19:31:53 -0000</pubDate><title>Re: DynV6: dynamic DNS for IPv6 done right!</title><guid isPermaLink="false">2099375061@Uncensored</guid><description><![CDATA[ > 2024-02-08 23:25 from IGnatius T Foobar       
 >Subject: DynV6: dynamic DNS for IPv6 done right!      
      
 This brings the question: how are big boys dealing with assining names and
DNS entries to Ipv6 connected hosts?     
    
 Because the obvious answer would be to grant a static ipv6 lease to each
host and then create an static DNS entry for it, but that kind of defeats
the purpose of ipv6 and it does not sound like it scales much.   
  
 Also, since your available ipv6 addresses depenbd of your i2p, if your ISP
is one of those that rotates your prefix then you can't even do static. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099375046</link><pubDate>Sat, 10 Feb 2024 16:57:04 -0000</pubDate><title>Re: DynV6: dynamic DNS for IPv6 done right!</title><guid isPermaLink="false">2099375046@Uncensored</guid><description><![CDATA[Ok, I think I'm mistaken, the software running the service is not open source;
their public repo is just clients.  Still, I'm impressed and have started
using it. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099374978</link><pubDate>Fri, 09 Feb 2024 04:25:19 -0000</pubDate><title>DynV6: dynamic DNS for IPv6 done right!</title><guid isPermaLink="false">2099374978@Uncensored</guid><description><![CDATA[  
 Ok, this is cool.  Dynamic DNS for IPv6 done right. 
  
 [ https://dynv6.com/ ] 
  
 It isn't just regular IPv6 DDNS.  For starters, you can use any of their
domains, or you can delegate one of your own (I'm using v6.citadel.org for
example).  But that's not the really cool part: 
  
 In your subdomain, you can put MAC addresses instead of IPv6 addresses for
all of your hosts.  This assumes, of course, that you're using EUI64 SLAAC
addressing.  Now, if your dynamic IPv6 prefix changes, you only have to make
ONE API CALL to their service, and it updates ALL of your AAAA records. 
  
 So now you don't need to have a dynamic DNS client on every machine!  As
long as they're using EUI64 SLAAC addressing, everything changes at once.
 I enrolled a couple of my machines plus my printer, which can't run a DDNS
client because it's a printer. 
  
 And as an added bonusfest, they open sourced the whole thing, so you can
run it yourself if you don't want to use theirs. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099373427</link><pubDate>Wed, 17 Jan 2024 22:54:15 -0000</pubDate><title>Message #2099373427</title><guid isPermaLink="false">2099373427@Uncensored</guid><description><![CDATA[ > In DS-Lite your routing gear connects to the ISP using Ipv6 ONLY, then
 
 >some router upstream gives you a NAT ipv4 tunnel to the outside world. 
 
  
 That's how my phone is connected.  T-Mobile moved to an all-IPv6 network,
with NAT64 at their network edge.  Android handsets as well as their "home
internet" gateways handle the NAT46 side internally.  Apple devices have some
horrifying thing embedded in the system libraries. 
  
 It's just fine for an access device, but I wouldn't want it at home if I
wanted to run servers. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099373405</link><pubDate>Wed, 17 Jan 2024 17:04:39 -0000</pubDate><title>Message #2099373405</title><guid isPermaLink="false">2099373405@Uncensored</guid><description><![CDATA[  
 Still no IPv6 where I'm at (CableVision) unless you count anycast 6to4, which
probably causes more problems than it's worth if you turn it on. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099373389</link><pubDate>Wed, 17 Jan 2024 12:41:21 -0000</pubDate><title>Message #2099373389</title><guid isPermaLink="false">2099373389@Uncensored</guid><description><![CDATA[<html><body>

<p>its been a few years, as the 2nd day i moved to fiber i got my dedicated IP ( a previous story )</p>
<p>But i think i had both a v4 and v6 address. I know i had v4 as is that is what i had/have setup for DNS, and of course it failed at first.  Of course only visible to my neighbors ( i assume. i didnt test.. ) This "neighborhood NAT" stuff was new to me so i just called to complain and didnt play with it any.    I guess i should add the v6 address too someday soon? </p>
<blockquote>
<div class="message_header"><span>Wed Jan 17 2024 03:12:37 EST</span> <span>from <a href="do_template?template=user_show?who=darknetuser">darknetuser</a> </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY">In DS-Lite your routing gear connects to the ISP using Ipv6 ONLY, then some router upstream gives you a NAT ipv4 tunnel to the outside world. </div>
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099373368</link><pubDate>Wed, 17 Jan 2024 08:12:37 -0000</pubDate><title>Message #2099373368</title><guid isPermaLink="false">2099373368@Uncensored</guid><description><![CDATA[ > 2024-01-16 19:00 from Nurb432     
 >Wouldn't that be the case for anyone who is behind a neighborhood NAT  
 
 >too?  Or at your local coffee shop NAT.     
 >    
 >At least effectively, since you cant get in from the outside.. ( or    
 >for us old timers, 'in thru the out door'... with luck you all get    
 >the reference )     
    
 Chances are, people behind CG-NAT is actually conncting to the Internet over
DS-Lite or a similar hellspawned invention.   
  
 In DS-Lite your routing gear connects to the ISP using Ipv6 ONLY, then some
router upstream gives you a NAT ipv4 tunnel to the outside world. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099373355</link><pubDate>Wed, 17 Jan 2024 00:00:35 -0000</pubDate><title>Message #2099373355</title><guid isPermaLink="false">2099373355@Uncensored</guid><description><![CDATA[<html><body>

<p>Wouldn't that be the case for anyone who is behind a neighborhood NAT too?  Or at your local coffee shop NAT.</p>
<p>At least effectively, since you cant get in from the outside.. ( or for us old timers, 'in thru the out door'... with luck you all get the reference )</p>
<blockquote>
<div class="message_header"><span>Tue Jan 16 2024 18:24:52 EST</span> <span>from <a href="do_template?template=user_show?who=msgrhys">msgrhys</a> </span></div>
<div class="message_content">
<p>My isp does not provide ipv6, heh.</p>
<blockquote>
<div class="message_header"> </div>
</blockquote>
</div>
</blockquote>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099373354</link><pubDate>Tue, 16 Jan 2024 23:24:52 -0000</pubDate><title>Message #2099373354</title><guid isPermaLink="false">2099373354@Uncensored</guid><description><![CDATA[<html><body>

<p>My isp does not provide ipv6, heh.</p>
<blockquote>
<div class="message_header"><span>Tue Jan 16 2024 17:17:39 EST</span> <span>from <a href="do_template?template=user_show?who=IGnatius T Foobar">IGnatius T Foobar</a> </span></div>
<div class="message_content">
<p>I'm actively thinking about how I want to set up my VPN mesh as I shuffle things around.</p>
<p>And yet ... I might not need it at all.  I'm slowly coming to the realization that just about every location has IPv6 now.  My hosting front end has IPv6, my home network has IPv6, and my smartphone is native IPv6 (from which it is derived that my laptop has IPv6 when I tether).</p>
<p>What are the reasons to use a VPN?  Reachability and privacy.  IPv6 solves the reachability issue, and just about every protocol now has its own TLS encryption now anyway.  So I might just go without!</p>
<br /><br /></div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099373350</link><pubDate>Tue, 16 Jan 2024 22:32:33 -0000</pubDate><title>Message #2099373350</title><guid isPermaLink="false">2099373350@Uncensored</guid><description><![CDATA[<html><body>

<p>Not me. I still want a wall up to the outside. </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099373348</link><pubDate>Tue, 16 Jan 2024 22:17:39 -0000</pubDate><title>Message #2099373348</title><guid isPermaLink="false">2099373348@Uncensored</guid><description><![CDATA[<html><body>

<p>I'm actively thinking about how I want to set up my VPN mesh as I shuffle things around.</p>
<p>And yet ... I might not need it at all.  I'm slowly coming to the realization that just about every location has IPv6 now.  My hosting front end has IPv6, my home network has IPv6, and my smartphone is native IPv6 (from which it is derived that my laptop has IPv6 when I tether).</p>
<p>What are the reasons to use a VPN?  Reachability and privacy.  IPv6 solves the reachability issue, and just about every protocol now has its own TLS encryption now anyway.  So I might just go without!</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099372260</link><pubDate>Tue, 02 Jan 2024 16:08:53 -0000</pubDate><title>Message #2099372260</title><guid isPermaLink="false">2099372260@Uncensored</guid><description><![CDATA[ > KittyGuard and Pritunl both look like they roughly exist in the same  

 >space as TailScale.  Now that WireGuard is here it looks like lots of  

  
 If I remember correctly, I looked at TailScale a while back. Overkill for
my use-case because it supports all this fully-meshed stuff (which pritunl
does not). I don't know what to tell you about KittyGuard... ask the Kitty.

]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099372039</link><pubDate>Wed, 27 Dec 2023 19:02:40 -0000</pubDate><title>Message #2099372039</title><guid isPermaLink="false">2099372039@Uncensored</guid><description><![CDATA[<html><body>

<p>Right. However LoRa does have the range advantage, but its traded for speed. ( and isn't really native IP ) so i do see a place for both in the world. But ya, it might eat into some IoT use that LoRa has been dominating over.</p>
<p>And apparently its really low power resource use too.</p>
<blockquote>
<div class="message_header"><span>Wed Dec 27 2023 13:17:41 EST</span> <span>from <a href="do_template?template=user_show?who=IGnatius T Foobar">IGnatius T Foobar</a> </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY">Weird. So they're going to do something in the 900 MHz band, like 1st-generation cordless phones. I could see it taking some market share away from LoRa and Zigbee on the basis of "you already have it" if they start building it into consumer grade routers. </div>
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099372031</link><pubDate>Wed, 27 Dec 2023 18:17:41 -0000</pubDate><title>Message #2099372031</title><guid isPermaLink="false">2099372031@Uncensored</guid><description><![CDATA[Weird.  So they're going to do something in the 900 MHz band, like 1st-generation
cordless phones.  I could see it taking some market share away from LoRa and
Zigbee on the basis of "you already have it" if they start building it into
consumer grade routers. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099371877</link><pubDate>Sun, 24 Dec 2023 23:47:21 -0000</pubDate><title>Message #2099371877</title><guid isPermaLink="false">2099371877@Uncensored</guid><description><![CDATA[<html><body>

<p>802.11 ah halow.  just heard about that today, seems interesting.  Be good for neighborhood mesh ..</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099369606</link><pubDate>Thu, 23 Nov 2023 18:43:05 -0000</pubDate><title>Message #2099369606</title><guid isPermaLink="false">2099369606@Uncensored</guid><description><![CDATA[<html><body>

<p>Yes, yes it does.  And it works well.  I'm using it to build a virtual network across five (ok now four, since one machine moved recently) sites.  Some of the wireguard endpoints are individual machines, but others are gateways with subnets behind them.  Among the gateways, one is a virtual machine running the reference implementation, and one is a Mikrotik router.</p>
<p>At present, I have to manually establish links between pairs of sites.  There's no automatic full mesh.</p>
<p>Software such as Tailscale handles that for you, but it requires their server and their software on each endpoint.  I'm, looking for a <em>standard</em> way of automatically establishing a full mesh.</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099369442</link><pubDate>Tue, 21 Nov 2023 18:13:21 -0000</pubDate><title>Message #2099369442</title><guid isPermaLink="false">2099369442@Uncensored</guid><description><![CDATA[<html><body>

<p>WireGuard has built-in routering.  You just need to connect your peers and WireGuard handles all routing internally.</p>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099369382</link><pubDate>Mon, 20 Nov 2023 23:18:57 -0000</pubDate><title>Message #2099369382</title><guid isPermaLink="false">2099369382@Uncensored</guid><description><![CDATA[<html><body>

<p>So a mesh of friends...</p>
<p> </p>
<p>Or am i still way out in left field :) </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099369376</link><pubDate>Mon, 20 Nov 2023 21:40:13 -0000</pubDate><title>Message #2099369376</title><guid isPermaLink="false">2099369376@Uncensored</guid><description><![CDATA[Not public.  Think of it like an exchange point.  Everyone who peers with
the route servers receives the prefixes of everyone else who peers with the
route servers.  The idea is that you could create a mesh (which software like
TailScale does) but in a *standard* way. 
    
 I suppose you could also build route server technology into WireGuard itself,
but that would be contrary to one of the design goals of WireGuard, which
is to be simple and small.  It does that admirably. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099369267</link><pubDate>Sat, 18 Nov 2023 22:32:58 -0000</pubDate><title>Message #2099369267</title><guid isPermaLink="false">2099369267@Uncensored</guid><description><![CDATA[<html><body>

<p>so a public mesh , in effect?</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099369266</link><pubDate>Sat, 18 Nov 2023 22:06:11 -0000</pubDate><title>Message #2099369266</title><guid isPermaLink="false">2099369266@Uncensored</guid><description><![CDATA[I feel as if what WireGuard needs most right now is to have its own BGP address
family.  Wouldn't that be cool?  Then it would be like a peering exchange:
you peer with the route server and it feeds you back all of the other peers
and what's behind them.  WireGuard cryptokey routes are small enough that
they would fit inside a BGP announcement. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099369139</link><pubDate>Thu, 16 Nov 2023 21:20:55 -0000</pubDate><title>Message #2099369139</title><guid isPermaLink="false">2099369139@Uncensored</guid><description><![CDATA[<html><body>

<p>WireGuard runs UDP.  Since it runs in the kernel, it can be any port you want.  Fun fact: there's no default "wireguard port" in the spec.</p>
<blockquote>
<div class="message_header"><span>Thu Nov 16 2023 14:38:59 EST</span> <span>from <a href="do_template?template=user_show?who=Nurb432">Nurb432</a> </span></div>
<div class="message_content">
<p>Totally out in left field i know..and i could go look i guess</p>
<p>But is the protocol across UDP or TCP ?</p>
<p>Reason i ask office blocks nearly all UDP packets on public WiFi. and nearly all ports other than 80 and 443 and a couple others across TCP. I have a hard time getting anything to work. "we are so secure" yet they prevent people from using it to be secure too. Oh and while its not 'blocked' VPN use is forbidden on the internal network unless its theirs. You get caught you get fired.</p>
<br /><br /></div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099369133</link><pubDate>Thu, 16 Nov 2023 19:38:59 -0000</pubDate><title>Message #2099369133</title><guid isPermaLink="false">2099369133@Uncensored</guid><description><![CDATA[<html><body>

<p>Totally out in left field i know..and i could go look i guess</p>
<p>But is the protocol across UDP or TCP ?</p>
<p>Reason i ask office blocks nearly all UDP packets on public WiFi. and nearly all ports other than 80 and 443 and a couple others across TCP. I have a hard time getting anything to work. "we are so secure" yet they prevent people from using it to be secure too. Oh and while its not 'blocked' VPN use is forbidden on the internal network unless its theirs. You get caught you get fired.</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099369130</link><pubDate>Thu, 16 Nov 2023 17:56:25 -0000</pubDate><title>Message #2099369130</title><guid isPermaLink="false">2099369130@Uncensored</guid><description><![CDATA[<html><body>

<p>You can still use KittyGuard!  Just make sure you do "doas pkg install -y miniupnpc" then configure KittyGuard appropriately.  KittyGuard uses the upnpc command to get its UDP port forwards for WireGuard packets to come in.</p>
<p>With WireGuard, there is no need to sit at the network edge, as long as packets can flow, you're good.  KittyGuard makes that part easy.</p>
<blockquote>
<div class="message_header"><span>Thu Nov 16 2023 09:34:59 EST</span> <span>from <a href="do_template?template=user_show?who=IGnatius T Foobar">IGnatius T Foobar</a> </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY"><br />KittyGuard and Pritunl both look like they roughly exist in the same space as TailScale. Now that WireGuard is here it looks like lots of people are attracted to the idea of using it as an overlay network instead of manually stitching together point-to-point links as was the common practice with IPsec. <br /><br />I like this approach. I like it a lot. And yet, I cannot use it. Actually I could use KittyGuard if my FreeBSD machine was sitting at the network edge, but it isn't. All of the machines at my home are sitting behind a Mikrotik router, which supports WireGuard natively. Yes, I know I could switch to any of half a dozen different open source routers running on a cute little edge device, but I spend my days designing and maintaining data centers and I gave up high-intensity home network sysadmin job 12 years ago. And anyway my home network is all Mikrotik, the router has the controller for the wifi access points, etc. <br /><br />So anyway, I've got the Mikrotik handli
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099369117</link><pubDate>Thu, 16 Nov 2023 14:34:59 -0000</pubDate><title>Message #2099369117</title><guid isPermaLink="false">2099369117@Uncensored</guid><description><![CDATA[  
 KittyGuard and Pritunl both look like they roughly exist in the same space
as TailScale.  Now that WireGuard is here it looks like lots of people are
attracted to the idea of using it as an overlay network instead of manually
stitching together point-to-point links as was the common practice with IPsec.

  
 I like this approach.  I like it a lot.  And yet, I cannot use it.  Actually
I could use KittyGuard if my FreeBSD machine was sitting at the network edge,
but it isn't.  All of the machines at my home are sitting behind a Mikrotik
router, which supports WireGuard natively.  Yes, I know I could switch to
any of half a dozen different open source routers running on a cute little
edge device, but I spend my days designing and maintaining data centers and
I gave up high-intensity home network sysadmin job 12 years ago.  And anyway
my home network is all Mikrotik, the router has the controller
for the wifi access points, etc. 
  
 So anyway, I've got the Mikrotik handling my home network, another WireGuard
instance at the edge of my server farm at the main data center, and a few
other locations where I have stuff.  That's what KittyNet sounds like, so
maybe we have the same kind of setup. 
  
 I'd like to do the "zero configuration ultra-mesh" type of thing, with the
endpoints registering their locations so everyone can talk to everyone.  But
so far, no one has done it in a mixed-mode kind of way. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099368909</link><pubDate>Mon, 13 Nov 2023 22:35:51 -0000</pubDate><title>Message #2099368909</title><guid isPermaLink="false">2099368909@Uncensored</guid><description><![CDATA[  
 Interesting. I use pritunl which is nice because it has 2FA. There's wireguard
support, but it's a bit of a bolt-on and I haven't made the time to fully
investigate it yet... 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099368778</link><pubDate>Sun, 12 Nov 2023 06:12:46 -0000</pubDate><title>Message #2099368778</title><guid isPermaLink="false">2099368778@Uncensored</guid><description><![CDATA[<html><body>

<p>I spented the day workering on softwares.  KittyGuard v2.0 was released today.  Very nice.</p>
<p><a href="https://gitlab.com/LadySerenaKitty/kgtools" target="_blank">https://gitlab.com/LadySerenaKitty/kgtools</a></p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099368772</link><pubDate>Sun, 12 Nov 2023 00:08:57 -0000</pubDate><title>Message #2099368772</title><guid isPermaLink="false">2099368772@Uncensored</guid><description><![CDATA[<html><body>

<p>I spent time in the garage, setting things up to be tossed that have not been used in a while ( like a vacuum pump.. ).</p>
<blockquote>
<div class="message_header"><span>Sat Nov 11 2023 18:33:51 EST</span> <span>from <a href="do_template?template=user_show?who=IGnatius T Foobar">IGnatius T Foobar</a> </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY"><br /><br />And to think ... I could have spent my saturday drinking beer and watching sportsball! </div>
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099368769</link><pubDate>Sat, 11 Nov 2023 23:33:51 -0000</pubDate><title>Message #2099368769</title><guid isPermaLink="false">2099368769@Uncensored</guid><description><![CDATA[  
 Finished my latest wiring project today.  No big deal, but it's satisfying.

  
 Last year I set up some driveway lights, and I had to open up some ceilings
to get power over to the corner of the house where the conduit exits.  While
it was open I added some smurf tube for future data cable, and now that tube
is populated. 
  
 The ugly cables along the baseboards in the mud room are now gone.  One was
disused coaxial cable and is now gone, the other was moved to the tube and
feeds the ethernet jack in my son's bedroom.  The tube also now contains an
ethernet run to the den, where it is feeding a hardwired Roku in the home
theater.  We got tired of the shitty Chromecast and are ready to have the
same solid experience that we do in the living room. 
  
 Plus I can make the posers' heads explode by telling them that my televisions
are all attached to the network on 100 Mbps ports.  (They're
feed throughs from wireless access points, in case you were wondering.)  I'll
bet most of them think they need 2.5 Gbps ports or 10 Gbps ports for everything.
 In practice, an HD stream is only 4 to 8 Mbps, and even a 4K stream is only
15 to 68 Mbps -- usually less, in practice, and the transition from H.264
to H.265 will make it even less.  So it's a good use for those ports and I
don't have to add a switch to the main wiring center. 
  
 And to think ... I could have spent my saturday drinking beer and watching
sportsball! 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099355073</link><pubDate>Mon, 21 Aug 2023 13:07:20 -0000</pubDate><title>Message #2099355073</title><guid isPermaLink="false">2099355073@Uncensored</guid><description><![CDATA[<html><body>

<p>Neat</p>
<p>Site to site VPN ( from us to azure cloud ). As of about 5 am some traffic started being blocked. but not all..   in both directions.  And not just hard stops, some ports work, some IPs work, some dont. its not consistent.  </p>
<p>And of course both sides are pointing their fingers at the other side and we are getting nowhere.. </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099331765</link><pubDate>Wed, 29 Mar 2023 03:33:18 -0000</pubDate><title>Re: Netmaker -- an open source alternative to TailScale</title><guid isPermaLink="false">2099331765@Uncensored</guid><description><![CDATA[That's fine, either way you found out about it. 
  
 Unfortunately I can't run TailScale because my Wireguard network has endpoints
that can't run the client.  One is a NAT64 gateway in the R&D lab at work
that I am better off not messing with.  Another is my Mikrotik router at home,
which despite having a real kernel cannot run arbitrary programs. 
  
 That probably misses the point, though.  I think you're not really supposed
to run TailScale on the network edge; you're supposed to just run it on every
workstation and server in your organization and you let it figure out the
topology for you. 
  
 I should just turn on BGP and run a route server.  But I guess there's the
small matter of knowing the public key and UDP port of each endpoint.  Ooooh,
I know!  I'll create my own BGP address family :) 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099322954</link><pubDate>Tue, 17 Jan 2023 18:22:00 -0000</pubDate><title>Re: Netmaker -- an open source alternative to TailScale</title><guid isPermaLink="false">2099322954@Uncensored</guid><description><![CDATA[<html><body>

<p>lol. paranoid me did a search and didnt hit the link so never noticed.  Not that i dont trust YOU, but its habit.</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099322949</link><pubDate>Tue, 17 Jan 2023 18:14:18 -0000</pubDate><title>Re: Netmaker -- an open source alternative to TailScale</title><guid isPermaLink="false">2099322949@Uncensored</guid><description><![CDATA[Sorry, I apparently posted an exit link from Business Facebook (LinkedIn).
 The real link is: 
  
 https://www.netmaker.io 
  
 Meshed Wireguard is so obvious at this point that I think it's obvious Netmaker
will either put TailScale out of business or force them to make their core
product available as open source. 
  
 I want to see more Wireguard, more everywhere.  IPSEC needs to go the way
of Apache and Sendmail.  I was over-the-moon delighted when Mikrotik added
Wireguard support in RouterOS 7.  Now my home network is connected to my hosting
network, and my hosting network spans two sites, and everything is so happy.

]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099322790</link><pubDate>Sun, 15 Jan 2023 13:07:26 -0000</pubDate><title>Re: Netmaker -- an open source alternative to TailScale</title><guid isPermaLink="false">2099322790@Uncensored</guid><description><![CDATA[<html><body>

<p>Justification of existence.</p>
<p>And the constant change.. pisses me off greatly.  Make it work, leave it the F- alone.</p>
<blockquote>
<div class="message_header"><span>Sun Jan 15 2023 05:40:08 AM EST</span> <span>from <a href="do_template?template=user_show?who=darknetuser">darknetuser</a> </span> <span class="message_subject">Subject: Re: Netmaker -- an open source alternative to TailScale</span></div>
<div class="message_content">
<div class="fmout-JUSTIFY">The link you shared cannot be accessed from here so I just visited the main website of the project. I must say that I hate modern website design when it comes to hosting software products. The UX crowd masturbates so hard with them I feel the need to wash my hands after visiting them. </div>
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099322768</link><pubDate>Sun, 15 Jan 2023 10:40:08 -0000</pubDate><title>Re: Netmaker -- an open source alternative to TailScale</title><guid isPermaLink="false">2099322768@Uncensored</guid><description><![CDATA[ >NetMaker is, although they won't call it this, basically an open    
 >source version of TailScale. This was inevitable because TailScale    
 >was a great idea but real network administrators don't want to    
 >enslave their network to a proprietary technology any more than they   

 >want to read inspirational quotes on LinkedIn.    
 >    
    
 Thanks for the link. It looks interesting.   
  
 The link you shared cannot be accessed from here so I just visited the main
website of the project. I must say that I hate modern website design when
it comes to hosting software products. The UX crowd masturbates so hard with
them I feel the need to wash my hands after visiting them. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099322724</link><pubDate>Sat, 14 Jan 2023 18:00:33 -0000</pubDate><title>Netmaker -- an open source alternative to TailScale</title><guid isPermaLink="false">2099322724@Uncensored</guid><description><![CDATA[<html><body>

<p><span style="color: rgba(0, 0, 0, 0.9); font-family: -apple-system, system-ui, BlinkMacSystemFont, 'Segoe UI', Roboto, 'Helvetica Neue', 'Fira Sans', Ubuntu, Oxygen, 'Oxygen Sans', Cantarell, 'Droid Sans', 'Apple Color Emoji', 'Segoe UI Emoji', 'Segoe UI Emoji', 'Segoe UI Symbol', 'Lucida Grande', Helvetica, Arial, sans-serif; font-size: 14px;">I found this interesting:</span><br style="box-sizing: inherit; color: rgba(0, 0, 0, 0.9); font-family: -apple-system, system-ui, BlinkMacSystemFont, 'Segoe UI', Roboto, 'Helvetica Neue', 'Fira Sans', Ubuntu, Oxygen, 'Oxygen Sans', Cantarell, 'Droid Sans', 'Apple Color Emoji', 'Segoe UI Emoji', 'Segoe UI Emoji', 'Segoe UI Symbol', 'Lucida Grande', Helvetica, Arial, sans-serif; font-size: 14px; line-height: inherit !important;" /><br style="box-sizing: inherit; color: rgba(0, 0, 0, 0.9); font-family: -apple-system, system-ui, BlinkMacSystemFont, 'Segoe UI', Roboto, 'Helvetica Neue', 'Fira Sans', Ubuntu, Oxygen, 'Oxygen Sans', Cantarell, 'Droid Sans', 'Apple Color Em
<p><img src="https://miro.medium.com/max/700/1*ZmRAYajC7Fo9V4y_R5UHXw.png" alt="" /></p>
<p><img src="https://media.licdn.com/dms/image/sync/C4E27AQFkAbC4a-kOww/articleshare-shrink_800/0/1672929796621?e=1674324000&amp;v=beta&amp;t=FUBlOkqdz3lpJXOCFh1tOMC8OPxXjul0tX9PpQoX9ZE" alt="" /></p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099320184</link><pubDate>Sat, 17 Dec 2022 19:54:08 -0000</pubDate><title>Message #2099320184</title><guid isPermaLink="false">2099320184@Uncensored</guid><description><![CDATA[Yeah.  If you're serious about providing a service for the darknet, you put
it ON the darknet.  Join directly to I2P, Tor, Yggdrasil ... you have to assume
that all exit nodes are being operated by Gestapo (formerly known as FBI)
and every connection is logged and monitored. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099319123</link><pubDate>Wed, 07 Dec 2022 19:45:15 -0000</pubDate><title>Message #2099319123</title><guid isPermaLink="false">2099319123@Uncensored</guid><description><![CDATA[ > 2022-12-07 14:10 from Nurb432   
 >Hmm i thought it was more random and variable than that.   
 >  
 >    
 >  
 >That is too bad.  
 >  
  
 Tor exit nodes are not designed to be block-resistent. Some guard nodes are
(and those are the actually secret nodes). 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099319117</link><pubDate>Wed, 07 Dec 2022 19:10:07 -0000</pubDate><title>Message #2099319117</title><guid isPermaLink="false">2099319117@Uncensored</guid><description><![CDATA[<html><body>

<p>Hmm i thought it was more random and variable than that.</p>
<p> </p>
<p>That is too bad.</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099319115</link><pubDate>Wed, 07 Dec 2022 19:03:59 -0000</pubDate><title>Message #2099319115</title><guid isPermaLink="false">2099319115@Uncensored</guid><description><![CDATA[ > 2022-12-05 08:52 from Nurb432     
 >So one of cloud flare's services is to block TOR access.  Since TOR   

 >exit-points can be any PC on the planet, how do they know?      
 >    
 >It does work, just not sure how it could, at least completely.    
 >    
    
 The addresses of Tor exit nodes are public knowledge. There are very few
secret Tor Nodes. Most are registered in the open and you can actually download
the lists of registered nodes at any given time.   
  
 The issue I have with Tor is that, by its very nature, it makes the network
easy to abuse and so mucy people end up blocking it. I like I2P because it
does not let itself be used to piss other people. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099318842</link><pubDate>Mon, 05 Dec 2022 13:52:08 -0000</pubDate><title>Message #2099318842</title><guid isPermaLink="false">2099318842@Uncensored</guid><description><![CDATA[<html><body>

<p>So one of cloud flare's services is to block TOR access.  Since TOR exit-points can be any PC on the planet, how do they know? </p>
<p>It does work, just not sure how it could, at least completely.</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099315972</link><pubDate>Sat, 05 Nov 2022 20:31:17 -0000</pubDate><title>Message #2099315972</title><guid isPermaLink="false">2099315972@Uncensored</guid><description><![CDATA[<html><body>

<p>"nginx proxy manager"   Ran across this earlier this week and tried it out today. For someone who struggled getting config files to work right in 'raw' nginx, this is wonderful.</p>
<p>Within 5 minutes i had it installed, ( not including time to setup a vm +docker )  and 3 of my hosts setup. 2 now have ssl via the proxy, the 3rd is pass-thru ssl as the host had its own.</p>
<p>even tho i'm not fond of docker anything, I think i will retire my Apache proxy... </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099311994</link><pubDate>Thu, 29 Sep 2022 19:05:37 -0000</pubDate><title>Message #2099311994</title><guid isPermaLink="false">2099311994@Uncensored</guid><description><![CDATA[Right.  And that's fine, because my primary objective is not to protect the
site from DDoS, but instead to protect the location where the origin servers
are hosted.  The front end VPN is capped at 5 Mbps and the IP addresses belong
to the front end provider. 
  
 If I get attacked, the sites will go down.  If the front end provider cancels
my account because of DDoS or because of political pressure, I can set up
the front end somewhere else, and the origin servers can stay where they are.

  
 I've spoken before about why I am more interested in protecting the origin
DC than in protecting the sites so I won't get into that again. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099311977</link><pubDate>Thu, 29 Sep 2022 16:24:28 -0000</pubDate><title>Message #2099311977</title><guid isPermaLink="false">2099311977@Uncensored</guid><description><![CDATA[  
 That's Origin Cloaking and it's a common approach to DDoS protection but
it isn't enough on its own. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099311918</link><pubDate>Wed, 28 Sep 2022 23:39:24 -0000</pubDate><title>Message #2099311918</title><guid isPermaLink="false">2099311918@Uncensored</guid><description><![CDATA[ > My objective is to keep the location of the origin servers both   
 >concealed and protected.   
  
 Interesting architecture.  With the added advantage that if one of the front
ends is attacked, it's relatively easy to bring up a replacement frontend
at provider D and repoint the DNS on the fly with no need to fiddle with the
origin servers. 
  
 At work we've been doing a lot with haproxy in a similar vein, more for redundancy
than security. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099311899</link><pubDate>Wed, 28 Sep 2022 20:34:12 -0000</pubDate><title>Message #2099311899</title><guid isPermaLink="false">2099311899@Uncensored</guid><description><![CDATA[  
 I'm not using a CDN, but my web properties (including this site) are really
distributed now. 
  
 * The front end to the clearnet is at provider A 
 * The front end to the darknet is at provider B 
 * And the origin servers are at provider C ... no way in except through VPN
from one of the front end sites 
  
 My objective is to keep the location of the origin servers both concealed
and protected. 
  
 I suppose you could also consider my home network to be location D, which
also has a VPN straight into the origin servers, bypassing both the clearnet
and darknet front ends. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099310413</link><pubDate>Mon, 12 Sep 2022 17:51:27 -0000</pubDate><title>Message #2099310413</title><guid isPermaLink="false">2099310413@Uncensored</guid><description><![CDATA[<html><body>

<p>Great..  Seems this weekend they move ALL our DNS records to be proxied by cloud flare. Even externally hosted apps.  we were told it was changing to transparent logging so was not expecting this..  They even moved department's stuff that didnt yet approve of being moved.</p>
<p>Explains why my stuff is slower today than normal. My test system timed out while doing some testing ( unrelated to CF ).. got a cloud flare message.   "oh crap.. no... they didnt...."</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099306023</link><pubDate>Sun, 17 Jul 2022 22:34:13 -0000</pubDate><title>Message #2099306023</title><guid isPermaLink="false">2099306023@Uncensored</guid><description><![CDATA[<html><body>

<p>This could go in a variety of rooms.  </p>
<p>Got an AD today fro Amazon. Its a box to block radio signal so you can "use your router in safety"..</p>
<p>Um, if you are that concerned, turn off WiFi?</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099304930</link><pubDate>Wed, 29 Jun 2022 16:01:44 -0000</pubDate><title>Message #2099304930</title><guid isPermaLink="false">2099304930@Uncensored</guid><description><![CDATA[DNSSEC has to do with digital signing of the records for authenticity and
accuracy and such.  DoH secures the transport itself.  You can use them together.

]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099304843</link><pubDate>Tue, 28 Jun 2022 12:34:21 -0000</pubDate><title>Message #2099304843</title><guid isPermaLink="false">2099304843@Uncensored</guid><description><![CDATA[ > Are you talking about DNSSED and the line? Those are easy enough to   
 >carry over to your own servers.   
  
 Don't quite remember but it's a browser thing relating to Chrome (and maybe
others') new default behavior. Sounds like IG had it right when he mentiond
DNS-over-HTTPS. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099304826</link><pubDate>Tue, 28 Jun 2022 09:56:48 -0000</pubDate><title>Message #2099304826</title><guid isPermaLink="false">2099304826@Uncensored</guid><description><![CDATA[ > The only problem I can see is that now the bad guys are using DNS over
   
 >HTTPS.    
 > I have no idea how to block that.     
 >     
 >    
    
 An https proxy with DPI and a blacklist.   
  
 I have one of those ready for deployment but I have not found the need to
roll it out. Breaking TLS with a MITM makes me nervous even if there are legitimate
reasons for it. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099304824</link><pubDate>Tue, 28 Jun 2022 09:54:59 -0000</pubDate><title>Message #2099304824</title><guid isPermaLink="false">2099304824@Uncensored</guid><description><![CDATA[ > 2022-06-14 15:55 from LoanShark   
 >      
 > it's not just Docker anymore, either. Browsers like Chrome are   
 >starting to default their DNS resolution to public servers like 8.8.8.8
 
 >because those support a secured protocol that's not supported by your  

 >typical DNS server. Disabling or redirecting may have unforseeable   
 >consequences (but some will do it anyway until the consequences rear   
 >their heads.)     
 >    
 >    
 > And I'm not saying "don't do it", people will do what they need to,   
 >I'm simply sounding a word of caution.   
 >   
 >  
  
 Are you talking about DNSSED and the line? Those are easy enough to carry
over to your own servers. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099303634</link><pubDate>Tue, 14 Jun 2022 20:33:26 -0000</pubDate><title>Message #2099303634</title><guid isPermaLink="false">2099303634@Uncensored</guid><description><![CDATA[ > I think doing some iptables NAT trickery so any outbound connection   
 >targetting an external DNS server is directed to your own DNS server is
 
 >cleaner.   
  
 Agreed, and you can put it at your network edge to keep rogue Googleforcers
at bay. 
  
 The only problem I can see is that now the bad guys are using DNS over HTTPS.
 I have no idea how to block that. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099303630</link><pubDate>Tue, 14 Jun 2022 19:55:32 -0000</pubDate><title>Message #2099303630</title><guid isPermaLink="false">2099303630@Uncensored</guid><description><![CDATA[    
 it's not just Docker anymore, either. Browsers like Chrome are starting to
default their DNS resolution to public servers like 8.8.8.8 because those
support a secured protocol that's not supported by your typical DNS server.
Disabling or redirecting may have unforseeable consequences (but some will
do it anyway until the consequences rear their heads.)   
  
  
 And I'm not saying "don't do it", people will do what they need to, I'm simply
sounding a word of caution. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099303605</link><pubDate>Tue, 14 Jun 2022 16:37:27 -0000</pubDate><title>Message #2099303605</title><guid isPermaLink="false">2099303605@Uncensored</guid><description><![CDATA[<html><body>

<p>i will have to try that</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099303556</link><pubDate>Tue, 14 Jun 2022 06:30:13 -0000</pubDate><title>Message #2099303556</title><guid isPermaLink="false">2099303556@Uncensored</guid><description><![CDATA[ > 2022-05-30 18:35 from IGnatius T Foobar   
 >Easiest thing to do, if you control the network, is to give *your* DNS 
 
 >server an address of 8.8.8.8   
 >   
 >  
  
 I think doing some iptables NAT trickery so any outbound connection targetting
an external DNS server is directed to your own DNS server is cleaner. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099303555</link><pubDate>Tue, 14 Jun 2022 06:28:41 -0000</pubDate><title>Message #2099303555</title><guid isPermaLink="false">2099303555@Uncensored</guid><description><![CDATA[ > 2022-05-29 13:22 from Nurb432       
 >Bit of a rant about ads/pihole earlier       
 >      
 >Looks like my Android phones and Chromebooks are hard coded to use     

 >google DNS. I can change the Chromebook ( but not the phone. grr! ),   
  
 >but cant use only my DNS server, as it will break at the office.      

 >And i guess ( never noticed before ) my Linux stuff is using what it   
  
 >found at install time, not changing it on the fly.  Also bogus. (     

 >they are all DHCP, with reserved addresses on the router, and NOT      
 >manually setup )       
 >      
 >Really, they should be using what my DHCP is handing out.        
 >      
      
 I have a tendency to treat my Android devices as inherently untrustworthy
since Android sucks so much.     
    
 I use a DNS MITM so I force those pesky Android pieces of shit to use my
DNS servers instead of the ones they want
to use.   
  
 As a side note, if you install the F-DROID version of Netguard you can force
the Android device to use DNS services you specify instead of the hardcoded
ones. Netguard comes with an integrated adblocker too which operates device-ise,
which is great. The Google Play version has the adblock removed for obvious
reasons. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099303259</link><pubDate>Sun, 12 Jun 2022 04:58:16 -0000</pubDate><title>Message #2099303259</title><guid isPermaLink="false">2099303259@Uncensored</guid><description><![CDATA[IPv6 is teh r0x0r and I'm trying to use it everywhere!  I want to see more
[::1]. 
  
 And yes, the safeguards need to consider a lot of different ways they can
sneak out and get to undesirable DNS servers.  In these systems I actually
don't match on anything at all; I just make sure 8.8.8.8 is either blocked
or spoofed for the entire environment.  (We do a lot of private cloud environments
so it's probably easier here than in some places.) 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099303157</link><pubDate>Fri, 10 Jun 2022 22:22:49 -0000</pubDate><title>Message #2099303157</title><guid isPermaLink="false">2099303157@Uncensored</guid><description><![CDATA[<html><body>

<p>There's no place like [::1].</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099303153</link><pubDate>Fri, 10 Jun 2022 22:09:35 -0000</pubDate><title>Message #2099303153</title><guid isPermaLink="false">2099303153@Uncensored</guid><description><![CDATA[ > 2022-06-10 13:10 from IGnatius T Foobar   
 >Yeah.  That's pretty awful and I've put safeguards against it in a   
 >couple of systems I built since the last time you mentioned it, so   
  
 I wonder if your safeguards are enough. You may need to match on 127.0.0.0/8
because technically localhost is a node on localnet -- systemd-resolved uses
127.0.0.53 for instance I believe. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099303120</link><pubDate>Fri, 10 Jun 2022 17:10:55 -0000</pubDate><title>Message #2099303120</title><guid isPermaLink="false">2099303120@Uncensored</guid><description><![CDATA[Yeah.  That's pretty awful and I've put safeguards against it in a couple
of systems I built since the last time you mentioned it, so thank you for
that.  Aside from not wanting to feed the googlebeast, we also need access
to some private DNS infrastructure, so having lookups be completely broken
is preferable to having it use public DNS because it's easier to troubleshoot.

  
 The other alternative, is instead of spoofing 8.8.8.8 and 8.8.4.4 and 1.1.1.1
and the rest, you can simply capture all port 53 traffic at the perimeter
firewall and reroute those lookups to "your" DNS server.  ${WORK} does this
to prevent circumvention of their DNS-based web filter ... which is fine unless
you're an engineer who needs to actually test hosting systems that include
DNS. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099303037</link><pubDate>Thu, 09 Jun 2022 21:27:37 -0000</pubDate><title>Message #2099303037</title><guid isPermaLink="false">2099303037@Uncensored</guid><description><![CDATA[ > 2022-05-30 18:35 from IGnatius T Foobar   
 >Easiest thing to do, if you control the network, is to give *your* DNS 
 
 >server an address of 8.8.8.8   
  
 oooooh, that might be a good workaround for that annoying Docker localhost
bug. 
  
 (For those not in the know, if you have 127.0.0.1 in your resolv.conf, and
a Docker container is not running in `host` mode, it won't work exactly the
way you expect because 127.0.0.0 is no routable to the host from the container;
it just maps to the container. Docker deals with this by telling the container
to use 8.8.8.8[A1!) 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099302308</link><pubDate>Thu, 02 Jun 2022 15:48:51 -0000</pubDate><title>Message #2099302308</title><guid isPermaLink="false">2099302308@Uncensored</guid><description><![CDATA[Yeah.  And if you still want an external DNS, it's clear that 9.9.9.9 is more
trustworthy than 8.8.8.8 or 1.1.1.1. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099302097</link><pubDate>Tue, 31 May 2022 00:42:05 -0000</pubDate><title>Message #2099302097</title><guid isPermaLink="false">2099302097@Uncensored</guid><description><![CDATA[<html><body>

<p>Never mind i read that wrong.  Ya, that would be a one-and done without having to screw with the devices any..</p>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099302094</link><pubDate>Mon, 30 May 2022 23:04:49 -0000</pubDate><title>Message #2099302094</title><guid isPermaLink="false">2099302094@Uncensored</guid><description><![CDATA[<html><body>

<p>Ok ill bite.Why should i choose google's over something like opendns or even cloudflare?</p>
<blockquote>
<div class="message_header"><span>Mon May 30 2022 06:35:56 PM EDT</span> <span>from <a href="do_template?template=user_show?who=IGnatius T Foobar">IGnatius T Foobar</a> </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY">Easiest thing to do, if you control the network, is to give *your* DNS server an address of 8.8.8.8 </div>
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099302086</link><pubDate>Mon, 30 May 2022 22:35:56 -0000</pubDate><title>Message #2099302086</title><guid isPermaLink="false">2099302086@Uncensored</guid><description><![CDATA[Easiest thing to do, if you control the network, is to give *your* DNS server
an address of 8.8.8.8 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099302019</link><pubDate>Sun, 29 May 2022 17:23:35 -0000</pubDate><title>Message #2099302019</title><guid isPermaLink="false">2099302019@Uncensored</guid><description><![CDATA[<html><body>

<p>That explains a lot. </p>
<blockquote>
<div class="message_header"><span>Tue Apr 26 2022 09:19:24 AM EDT</span> <span>from <a href="do_template?template=user_show?who=IGnatius T Foobar">IGnatius T Foobar</a> </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY">The exception is the DirecTV-branded ones, which run in the 500 MHz band because the feed from your dish *does* use the 1 GHz band. <br /><br /></div>
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099302018</link><pubDate>Sun, 29 May 2022 17:22:05 -0000</pubDate><title>Message #2099302018</title><guid isPermaLink="false">2099302018@Uncensored</guid><description><![CDATA[<html><body>

<p>Bit of a rant about ads/pihole earlier</p>
<p>Looks like my Android phones and Chromebooks are hard coded to use google DNS. I can change the Chromebook ( but not the phone. grr! ), but cant use only my DNS server, as it will break at the office.  And i guess ( never noticed before ) my Linux stuff is using what it found at install time, not changing it on the fly.  Also bogus. ( they are all DHCP, with reserved addresses on the router, and NOT manually setup )</p>
<p>Really, they should be using what my DHCP is handing out.  </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099299482</link><pubDate>Tue, 26 Apr 2022 13:19:24 -0000</pubDate><title>Message #2099299482</title><guid isPermaLink="false">2099299482@Uncensored</guid><description><![CDATA[ >My cable does NOT go to the pole. i cut that off a decade ago.  But  
  
 That only matters if you're using the "DirecTV" branded bridges. 
  
 MoCA normally runs at frequencies at or above 1 GHz, which is where the cable
TV band ends (in the United States anyway).  It's designed to coexist with
a live cable television service. 
  
 The exception is the DirecTV-branded ones, which run in the 500 MHz band
because the feed from your dish *does* use the 1 GHz band. 
  
 And I wouldn't accept "just use wifi" either :) 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099299185</link><pubDate>Fri, 22 Apr 2022 22:01:45 -0000</pubDate><title>Message #2099299185</title><guid isPermaLink="false">2099299185@Uncensored</guid><description><![CDATA[ > 2022-04-22 22:01 from zelgomer <zelgomer@uncensored.citadel.org>   
 > > 2022-04-22 21:06 from Nurb432 <nurb432@uncensored.citadel.org>     
 > >When your up-link cable isn't clipped in and it falls out of your    
 > >switch,   your network slows down.      
 > >    
 >    
 >   
 >  
  
 *(@#&(*&%#@$ i am too stupid to use this ui 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099299184</link><pubDate>Fri, 22 Apr 2022 22:01:00 -0000</pubDate><title>Message #2099299184</title><guid isPermaLink="false">2099299184@Uncensored</guid><description><![CDATA[ > 2022-04-22 21:06 from Nurb432 <nurb432@uncensored.citadel.org>   
 >When your up-link cable isn't clipped in and it falls out of your  
 >switch,  your network slows down.   
 >  
  
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099299181</link><pubDate>Fri, 22 Apr 2022 21:06:44 -0000</pubDate><title>Message #2099299181</title><guid isPermaLink="false">2099299181@Uncensored</guid><description><![CDATA[<html><body>

<p>When your up-link cable isn't clipped in and it falls out of your switch,  your network slows down. </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099299017</link><pubDate>Wed, 20 Apr 2022 22:23:07 -0000</pubDate><title>Message #2099299017</title><guid isPermaLink="false">2099299017@Uncensored</guid><description><![CDATA[<html><body>

<p>Bleh, hit send too fast.</p>
<p>My cable does NOT go to the pole. i cut that off a decade ago.  But its still in the house, and running cat5 IN the house to where i need it would be a nightmare ( i think i mentioned that, but if not, its due to stupid truss attic and stuff in the way ) and running cat 5 outside, would be costly..   So just using what i have. </p>
<p>"Just use WiFi", interference around here is getting bad.  And sure, regular use is ok, but RDP and our stupid shop VPN, not so much. A little blip, and down it goes.</p>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099299015</link><pubDate>Wed, 20 Apr 2022 22:19:27 -0000</pubDate><title>Message #2099299015</title><guid isPermaLink="false">2099299015@Uncensored</guid><description><![CDATA[<html><body>

<p>From what i can tell its just the new standard, bit more bandwidth and its not point to point, you can have several of the devices hanging off the same 'cable'.</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099298983</link><pubDate>Wed, 20 Apr 2022 13:20:46 -0000</pubDate><title>Message #2099298983</title><guid isPermaLink="false">2099298983@Uncensored</guid><description><![CDATA[Were these MoCA repeaters?  Those were pretty common in DirecTV and FiOS installations.
 They can actually carry multiple "vlans" if you need that -- Verizon used
that feature to carry data from the fiber terminal to the router and then
from the router to the set top boxes. 
  
 I abandoned all of mine when I cut the cord and didn't need coax anymore
 :) 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099298730</link><pubDate>Sun, 17 Apr 2022 22:12:54 -0000</pubDate><title>Message #2099298730</title><guid isPermaLink="false">2099298730@Uncensored</guid><description><![CDATA[<html><body>

<p>Well, they arrived.  doubled my speed to the internet from my 'office' ( ~ 200m up/down now ) and a full 1gb to my servers... </p>
<p>Not that 100 mb wasn't enough for the 'office', but since i had to replace the boxes anyway....</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099298593</link><pubDate>Sat, 16 Apr 2022 16:50:38 -0000</pubDate><title>Message #2099298593</title><guid isPermaLink="false">2099298593@Uncensored</guid><description><![CDATA[<html><body>

<p>"was supposed to say 100m and 2 boxes"</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099298590</link><pubDate>Sat, 16 Apr 2022 16:06:50 -0000</pubDate><title>Message #2099298590</title><guid isPermaLink="false">2099298590@Uncensored</guid><description><![CDATA[<html><body>

<p>Well, those coax/Ethernet adapters worked well for about 3 months.  Now network is up/down last couple of days. Bleh. </p>
<p>They were cheap, DirectTV branded, no indicator lights ( not even a power light !?!?!? ) , so cant even tell if they are resetting, dead or what.   Ordered 2 more , WITH lights..  bit more expensive and not 'home units'. ( and 2.5g, and can support several boxes, not just 100m and 2.. not that ill do that, but still, better boxes )</p>
<p>Frustrating.  Was working so well....  </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099297978</link><pubDate>Tue, 12 Apr 2022 20:02:53 -0000</pubDate><title>Message #2099297978</title><guid isPermaLink="false">2099297978@Uncensored</guid><description><![CDATA[<html><body>

<p>I think this is true to a point. There are always some of us willing to fight back - but you get to a point where you're like Soviet era Communist Russia, or current China - where being a dissident - they'll not only kick in your door at 2 AM and drag you to the re-education camp - your entire family and loved ones, innocent and unaware or not, will be waiting there for you when you arrive, having already received a good deal of "re-education". <br /><br />We're nearing that event horizon in the West. </p>
<p> </p>
<blockquote>
<div class="message_header"><span>Mon Mar 21 2022 09:13:46 EDT</span> <span>from <a href="do_template?template=user_show?who=IGnatius T Foobar">IGnatius T Foobar</a> </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY">It ends up being a cat-and-mouse game -- one that I am ok with, in fact, because the harder the pigopolists work to lock down the choke points, the harder the free world will work to build new systems that don't have choke points. </div>
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099295951</link><pubDate>Mon, 21 Mar 2022 13:13:46 -0000</pubDate><title>Message #2099295951</title><guid isPermaLink="false">2099295951@Uncensored</guid><description><![CDATA[It ends up being a cat-and-mouse game -- one that I am ok with, in fact, because
the harder the pigopolists work to lock down the choke points, the harder
the free world will work to build new systems that don't have choke points.

]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099295788</link><pubDate>Sat, 19 Mar 2022 13:36:54 -0000</pubDate><title>Message #2099295788</title><guid isPermaLink="false">2099295788@Uncensored</guid><description><![CDATA[<html><body>

<p>That level of Orwellian control with just create innovation in ways that the laws do not address - kind of like the way that black market drugs created illegal designer drugs that were different enough at a molecular level to evade the coverage of the law. Of course, they'll develop new laws, and the black market will figure out new ways to skirt them. <br /><br />How did that go with the drug war? Eventually, they just gave up and legalized the base drugs because - in part - the designer attempts to get around those laws were often worse than the harm they were trying to prevent with the initial laws. <br /><br />Bath salts and synthetic marijuana were worse than just relaxing marijuana laws. <br /><br />Same thing will happen here. <br /><br />Over regulation is *eventually* self correcting. I mean, the drug war raged from about the 30s until 2020 - almost 100 years - and at its peak it was brutally oppressive. But throughout that entire time, people were still getting high. <br /><br />And, they'r
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099295364</link><pubDate>Mon, 14 Mar 2022 16:44:55 -0000</pubDate><title>Message #2099295364</title><guid isPermaLink="false">2099295364@Uncensored</guid><description><![CDATA[<html><body>

<p>I think they had ( still have? ) a piracy tax in Canada on storage. "because you might mis-use that drive"</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099295352</link><pubDate>Mon, 14 Mar 2022 13:15:54 -0000</pubDate><title>Message #2099295352</title><guid isPermaLink="false">2099295352@Uncensored</guid><description><![CDATA[ >Aside of one's feelings about copyright infringement, bit torrent is  
 >a protocol, not an action. This is stupid and a bad precedent.    
  
 That's because they are stupid and bad people.  :) 
  
 My browser of choice is Brave, but I can't use it at work because it has
a Tor client built into it.  At the moment, Brave is also my favorite search
engine, but it's blocked at our firewall to prevent people from downloading
the browser.  Grr. 
  
 In this case it's a privately operated network and following their rules
is reasonable because I'm using their computer on their network as part of
an employment arrangement.  But it's still frustrating to have a piece of
software blocked because of what someone "could" do with it. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099295308</link><pubDate>Sun, 13 Mar 2022 22:37:49 -0000</pubDate><title>Message #2099295308</title><guid isPermaLink="false">2099295308@Uncensored</guid><description><![CDATA[<html><body>

<p>In this case they are blocking fundamental protocols. So you wont be able to get your hookup with Julia.. </p>
<p>Can they stop it all. not easily but it can be done. "Only addresses we approve of ( ties back to US government wanting control over routing tables ), via protocols we approve the use of ( the commercial side of things ) and with encryption where we have the back door to ( government again )".  Any deviation = we cut your service and report you. You dont even have to be doing something wrong underneath, just the act of doing it is illegal. </p>
<p>They can also mandate a 'tainted IP stack' to where you dont get a connection at all if they cant monitor your packets at the source ( like they have wanted for video output. for decades now ).   Its sort of what some of the ISPs did in the dial up days.  Not nefarious in their case, but the concept does exist.  ( and yes that is severely paranoid, but i no longer put anything past 'them' ).   </p>
<p>Oh,and remember that little copy of minix running on every modern x86 motherboard underneath whatever you install? Well, it becomes mandated, to kill off 'unencumbered' legacy systems.</p>
<p> </p>
<p> </p>
<blockquote>
<div class="message_header"><span>Sun Mar 13 2022 01:39:45 PM EDT</span> <span>from <a href="do_template?template=user_show?who=ParanoidDelusions">ParanoidDelusions</a> </span></div>
<div class="message_content">
<p>We're going to see more and more of this - it was what I was talking about with rules for VR... <br /><br />They're going to sterilize the entire Internet/Metaverse whatever TF buzzword you want to use to describe being online - for the masses. It is mainstream and commercial now - and it'll be neutered down to the safest, most sanitized version possible - for those people. <br /><br />And the rest of us will be pushed further and further underground and off into the shanty-towns and ghettos of the Information Highway... far away in difficult places to reach that are very dangerous, very paranoid and very secure - and that require a strong understanding of what that means from an information technology perspective. <br /><br /><br />Think of the slums where Winston and Julia meet in Big Brother. In fact, all of it is analogous. Big Brother, Oceania - certainly knows about Uncensored, about The Sanitarium, about who goes there, what they think and believe. As long as those places and people are containe
<p> <br /><br /><br /><br /><br /> </p>
<br /><br /></div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099295291</link><pubDate>Sun, 13 Mar 2022 17:39:45 -0000</pubDate><title>Message #2099295291</title><guid isPermaLink="false">2099295291@Uncensored</guid><description><![CDATA[<html><body>

<p>We're going to see more and more of this - it was what I was talking about with rules for VR... <br /><br />They're going to sterilize the entire Internet/Metaverse whatever TF buzzword you want to use to describe being online - for the masses. It is mainstream and commercial now - and it'll be neutered down to the safest, most sanitized version possible - for those people. <br /><br />And the rest of us will be pushed further and further underground and off into the shanty-towns and ghettos of the Information Highway... far away in difficult places to reach that are very dangerous, very paranoid and very secure - and that require a strong understanding of what that means from an information technology perspective. <br /><br /><br />Think of the slums where Winston and Julia meet in Big Brother. In fact, all of it is analogous. Big Brother, Oceania - certainly knows about Uncensored, about The Sanitarium, about who goes there, what they think and believe. As long as those places and people are containe
<p> <br /><br /><br /><br /><br /> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099295288</link><pubDate>Sun, 13 Mar 2022 17:20:37 -0000</pubDate><title>Message #2099295288</title><guid isPermaLink="false">2099295288@Uncensored</guid><description><![CDATA[<html><body>

<p><span style="color: #292929; font-family: tablet-gothic, -apple-system, BlinkMacSystemFont, '&quot;Segoe UI&quot;', Roboto, '&quot;Helvetica Neue&quot;', Arial, '&quot;Noto Sans&quot;', 'sans-serif', '&quot;Apple Color Emoji&quot;', '&quot;Segoe UI Emoji&quot;', '&quot;Segoe UI Symbol&quot;', '&quot;Noto Color Emoji&quot;'; font-size: 18px;">"use commercially reasonable efforts to block BitTorrent traffic on its servers in the United States using firewall technology."<br /><br /><br />Translation: <br /><br />"The pirates will get around our reasonable efforts to block their traffic. It is what they do." <br /><br />They're just appeasing stupid people who think that once a picture of Axl Rose gets out onto the Internet, there is some way to take it back. <br /><br /></span></p>
<blockquote>
<div class="message_header"><span>Sun Mar 13 2022 13:16:13 EDT</span> <span>from <a href="do_template?template=user_show?who=Nurb432">Nurb432</a> </span></div>
<div class="message_content">
<p><span style="font-family: Helvetica, Arial, sans-serif; color: #050505; font-size: 15px; white-space: pre-wrap;" data-offset-key="dejcl-0-0">Aside of one's feelings about copyright infringement, bit torrent is a protocol, not an action. This is stupid and a bad precedent. </span></p>
<p><span class="py34i1dx" style="color: var(--blue-link); font-family: Helvetica, Arial, sans-serif; font-size: 15px; white-space: pre-wrap;"><a href="https://www.pcmag.com/news/torguard-will-prevent-vpn-customers-from-using-bittorrent" target="webcit01">https://www.pcmag.com/news/torguard-will-prevent-vpn-customers-from-using-bittorrent</a></span></p>
<br /><br /></div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099295286</link><pubDate>Sun, 13 Mar 2022 17:16:13 -0000</pubDate><title>Message #2099295286</title><guid isPermaLink="false">2099295286@Uncensored</guid><description><![CDATA[<html><body>

<p><span style="font-family: Helvetica, Arial, sans-serif; color: #050505; font-size: 15px; white-space: pre-wrap;" data-offset-key="dejcl-0-0">Aside of one's feelings about copyright infringement, bit torrent is a protocol, not an action. This is stupid and a bad precedent. </span></p>
<p><span class="py34i1dx" style="color: var(--blue-link); font-family: Helvetica, Arial, sans-serif; font-size: 15px; white-space: pre-wrap;">https://www.pcmag.com/news/torguard-will-prevent-vpn-customers-from-using-bittorrent</span></p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099294606</link><pubDate>Mon, 07 Mar 2022 12:59:43 -0000</pubDate><title>Message #2099294606</title><guid isPermaLink="false">2099294606@Uncensored</guid><description><![CDATA[<html><body>

<p>So i read this as the feds want control of the routing tables? "dont let a crisis go to waste"</p>
<p>https://www.nextgov.com/cybersecurity/2022/03/russias-cyber-tactics-are-prompting-fcc-address-internet-routing-security/362616/</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099294549</link><pubDate>Sun, 06 Mar 2022 20:07:08 -0000</pubDate><title>Message #2099294549</title><guid isPermaLink="false">2099294549@Uncensored</guid><description><![CDATA[Of course.  And for those living in apartment complexes in cities, it's likely
even worse.  Very densely packed airwaves.  I have neither any interest nor
any sympathy for those folks, because they likely have problems much larger
than the speed of their local area networks. 
  
 My house is smack in the middle of a one acre lot.  My neighbors to the east
and west are some 300-400 feet away; my neighbors to the north and south are
at least 100 feet away.  I can see the latter with a wifi scanner on a good
day, but the signals are weak and my own access points are far stronger. 
Also, my elevation is pretty low relative to the rest of the area, so getting
a signal out to the community at all would require quite an antenna (indeed,
I use a femtocell to get decent cell service). 
  
 I have to wonder whether the hesitancy of consumer ISPs to bless their customers
running servers has to do with
anything other than technical issues.  The lopsided bandwidth allocation of
DOCSIS and ADSL, the impracticality of assigning static IP addresses, the
reactive maintenance load of dealing with open mail relays ... is it any wonder
that when a fully open connection is available at all, it costs more?  Maybe
my perspective is different from most run-it-at-home hobbyists because I work
for a hosting company and actually know what's involved. 
  
 The suppression of independent voices wasn't really a thing when consumer
broadband first became available.  Perhaps it's a convenience to "them" now,
but I don't think it was designed into the system.  And I do think that the
next generation of micropublishing and microhosting will be built without
dependency on static IP addresses.  People who want to get their messages
out but can't because they live in third world shitholes like the United States
will continue to innovate around the choke points. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099294123</link><pubDate>Thu, 03 Mar 2022 00:19:10 -0000</pubDate><title>Message #2099294123</title><guid isPermaLink="false">2099294123@Uncensored</guid><description><![CDATA[<html><body>

<p>The West Coast is dense. Typically much smaller sized lots out here. You probably call them plats. Anyhow - my whole lot in Arizona is only just under 3000 sq. ft. bigger than my house in Ohio was (and the value is twice as much). <br /><br />Where we're dense - anyhow. The difference is, there can be a couple hundred miles of absolute NOTHING in all directions between two major urban areas... Like... empty... BLM *nothing* in all directions. <br /><br /><br /></p>
<blockquote>
<div class="message_header"><span>Wed Mar 02 2022 17:17:19 EST</span> <span>from <a href="do_template?template=user_show?who=Nurb432">Nurb432</a> </span></div>
<div class="message_content">
<p>Around here it varies.  out in the suburbs there is a lot of signal, but it depends on what side of town. Some areas have large enough yard, you get noting. Others are sardine cans and you get plenty.. You also have lot of stores that broadcast. But, In town, out on the sidewalks not a lot. Buildings block it i guess :)  Further out into rural areas, forget it.  And of course once you hit country, there is nothing. Even if you see a house,  you are way to far away.</p>
<p> </p>
<p>But i do think at least in 'average' suburbs like where i current live, mesh could work.  We are close enough together that you do get the houses immediately around you or as you walk down the street ( but not much more ). Now, get to the park, i doubt you would get any signal.  Ill have to try tomorow when i walk the dogs. </p>
<br /><br /></div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099294114</link><pubDate>Wed, 02 Mar 2022 22:17:19 -0000</pubDate><title>Message #2099294114</title><guid isPermaLink="false">2099294114@Uncensored</guid><description><![CDATA[<html><body>

<p>Around here it varies.  out in the suburbs there is a lot of signal, but it depends on what side of town. Some areas have large enough yard, you get noting. Others are sardine cans and you get plenty.. You also have lot of stores that broadcast. But, In town, out on the sidewalks not a lot. Buildings block it i guess :)  Further out into rural areas, forget it.  And of course once you hit country, there is nothing. Even if you see a house,  you are way to far away.</p>
<p> </p>
<p>But i do think at least in 'average' suburbs like where i current live, mesh could work.  We are close enough together that you do get the houses immediately around you or as you walk down the street ( but not much more ). Now, get to the park, i doubt you would get any signal.  Ill have to try tomorow when i walk the dogs. </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099294010</link><pubDate>Wed, 02 Mar 2022 06:30:54 -0000</pubDate><title>Message #2099294010</title><guid isPermaLink="false">2099294010@Uncensored</guid><description><![CDATA[<html><body>

<p>Absolutely agree that the value proposition of what commercial services offer is extraordinary... but it is the kind of shit you have to do - like - the service we tunnel through to host our Cits on... that irks me. Of course, regular consumers do not care nor do they understand... and I get why the big ISPs have these restrictions - with the kind of bandwidth they offer commercially - if your up matched your down and they weren't using DHCP - people would certainly take advantage of that for business enterprises. <br /><br />The value add that I see would be "no downtime, ever... no monitoring, ever... no limitations, ever... and free... the hardware would put you on a node-hopping IP network that... once you got past the initial hardware cost - would just "be there"." <br /><br />Phoenix may be somewhat unique - but the entire valley... as I drive around... it is just saturated with WiFi APs - *everywhere*. Everyone has security activated now - nobody has open APs... but if they were all open - you wo
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099293977</link><pubDate>Tue, 01 Mar 2022 22:21:24 -0000</pubDate><title>Message #2099293977</title><guid isPermaLink="false">2099293977@Uncensored</guid><description><![CDATA[<html><body>

<p>Ya it is amazing how far we have come.. in such a short time.</p>
<p>Tho i ( mentioned it before i'm sure ) saw cable broadband coming.  In one plant i worked at we did it in-house, ran IP across the same lines we ran the in-plant TV system.  Sure, it wasn't yet 'commercial ready' but i saw the potential as that was the early heyday of cable TV. Even discussed with our local ( rural ) cable company, but they were not interested.  "internet, what is that?"</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099293961</link><pubDate>Tue, 01 Mar 2022 17:43:12 -0000</pubDate><title>Message #2099293961</title><guid isPermaLink="false">2099293961@Uncensored</guid><description><![CDATA[Circumventing "big media" is orthogonal to this ... this is about establishing
a dumb pipe, regardless of whether you use it to access legacy media or new
media once you're online.  As influential as Big Media is today, they still
don't control the network.  IP is end-to-end; IPv6 even more so.  We must
be thankful that the Internet is built on IP and not something like SNA or
X.25 or the OSI stack, where top-down governance is baked into the lower protocol
layers. 
  
 It would be nice to be able to find an "Internet cooperative" in your area,
sign up and join with a simple device and sign-up procedure.  For this to
work, though, it has to bring *substantially* more value than the Internet
access that comes with your typical $99 triple-play package from the phone
or cable company.  And it has to be at least equally as reliable and low maintenance.

  
 As an anti-establishmentarian it pains
me to say this, but it's easy to underestimate what a tremendous value your
typical consumer grade Internet service represents.  I clearly recall being
a dialup BBS operator in the early 1990's and lamenting that I could not afford
the $300/month (plus the circuit costs) for a 56 Kbps Internet connection,
let alone the $1000/month (again, plus circuit costs) for a T1.  Today I have
a *fiber optic* connection into my house that brings the equivalent of 653
T1 circuits, or 21 T3 circuits, for substantially *under* $100/month.  In
terms of megabits per dollar, that's hard to beat! 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099293884</link><pubDate>Mon, 28 Feb 2022 21:51:46 -0000</pubDate><title>Message #2099293884</title><guid isPermaLink="false">2099293884@Uncensored</guid><description><![CDATA[<html><body>

<p>I agree... you just have to sell them on it... you have to spin it so that they *want* to be on - maybe by incentivizing it. Much the same way that people give up all their personal data and agree to all kinds of tracking for access to free content on YouTube, Facebook, and other sites - you've got to make something so attractive about opting in that people would sign up. <br /><br />The problem would be that the incumbents have deep purses and lots of influence with the media - so any product like this would get hammered with public interest tech articles spreading FUD about it - and you wouldn't have the finances to combat it if you were deploying something like this for actually altruistic goals - right? I mean... the real reason this would be awesome is because it would defeat the stranglehold of big media on the Internet. <br /><br />So of course, big media would circle their wagons around making sure it failed. </p>
<p> </p>
<blockquote>
<div class="message_header"><span>Mon Feb 28 2022 13:53:05 EST</span> <span>from <a href="do_template?template=user_show?who=Nurb432">Nurb432</a> </span></div>
<div class="message_content">
<p>Not 100% sure about that in this day and age, that it would be outright rejected. It could be "sold" correctly with good marketing. "you can use it when your internet goes down" Apple is doing it now, with their stupid tracking pods. I remember Comcast doing something similar, where if you had a WiFi router of theirs, they also let other customers attach to it, but separated from 'your' network.  I dont think anyone even noticed  "oh, whatever ok" ( they may still i donno )</p>
<p>Its enabled by default out of box, but you have to manually allow it to have internet. Few people would bother to go in and turn it off, even if they understood it. Call it a 'yet another guest network"</p>
<blockquote>
<div class="message_header"><span>Mon Feb 28 2022 11:08:19 AM EST</span> <span>from <a href="do_template?template=user_show?who=IGnatius T Foobar">IGnatius T Foobar</a> </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY">
<blockquote>Would be neat if home routers came that way by default.   I wont <br />hold my breath, but it would be neat.</blockquote>
<br />People would reject it unless it came with "free Internet". <br /><br /><br /></div>
</div>
</blockquote>
<br /><br /></div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099293875</link><pubDate>Mon, 28 Feb 2022 18:53:05 -0000</pubDate><title>Message #2099293875</title><guid isPermaLink="false">2099293875@Uncensored</guid><description><![CDATA[<html><body>

<p>Not 100% sure about that in this day and age, that it would be outright rejected. It could be "sold" correctly with good marketing. "you can use it when your internet goes down" Apple is doing it now, with their stupid tracking pods. I remember Comcast doing something similar, where if you had a WiFi router of theirs, they also let other customers attach to it, but separated from 'your' network.  I dont think anyone even noticed  "oh, whatever ok" ( they may still i donno )</p>
<p>Its enabled by default out of box, but you have to manually allow it to have internet. Few people would bother to go in and turn it off, even if they understood it. Call it a 'yet another guest network"</p>
<blockquote>
<div class="message_header"><span>Mon Feb 28 2022 11:08:19 AM EST</span> <span>from <a href="do_template?template=user_show?who=IGnatius T Foobar">IGnatius T Foobar</a> </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY">
<blockquote>Would be neat if home routers came that way by default.   I wont <br />hold my breath, but it would be neat. </blockquote>
<br />People would reject it unless it came with "free Internet". <br /><br /><br /></div>
</div>
</blockquote>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099293861</link><pubDate>Mon, 28 Feb 2022 16:08:19 -0000</pubDate><title>Message #2099293861</title><guid isPermaLink="false">2099293861@Uncensored</guid><description><![CDATA[ >Would be neat if home routers came that way by default.   I wont  
 >hold my breath, but it would be neat.  
  
 People would reject it unless it came with "free Internet". 
  
 The cable company here offers a municipal wi-fi service, mainly composed
of access points along their cable paths.  Thousands of them.  If you're a
customer, they throw that in at no extra charge; there's also a paid plan
available for non cable subscribers. 
  
 Some number of years ago there was a big outrage among their customers, when
it was discovered that anyone using the provider-supplied router automatically
became another access point for the municipal wi-fi network.  Subscribers
simply refused to tolerate it.  They did not want anyone using "their" Internet
connection, that they paid for, that they refused to share. 
  
 Sharing and pooling Internet with all of your neighbors over a wi-fi mesh
sounds
like a good idea in theory, but in practice it would fail for the same reason
socialism fails: human nature.  People are selfish.  A working model might
have some of the following requirements: 
  
 1. A way to pay or be paid for off-mesh Internet access.  This might work
something like the power grid, where producers and consumers are tied into
a common fabric.  Providers of off-mesh access can sell it to consumers. 
  
 2. Third party networks who want to offer access "for free" can simply peer
with the mesh network, bypassing the paid providers. 
  
 3. Don't even think about running IPv4 on this.  Everything needs to be end-to-end
addressable, so it's all IPv6.  Providers of off-mesh access can operate NAT64/DNS64
gateways to reach the IPv4 Internet.  (If you think this won't work, consider
that your smartphone is probably already doing it today.) 
  
 4. And of course, as mentioned
above, the easy button.  It has to work "out of the box".  This would take
the form of a router with a municipal wi-fi antenna that can be placed in
a good location, which for a "consumer only" node would be the only router
in the system.  For a "consumer+provider" node, it would also uplink to their
cable modem, fiber terminal, etc. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099293832</link><pubDate>Mon, 28 Feb 2022 12:10:16 -0000</pubDate><title>Message #2099293832</title><guid isPermaLink="false">2099293832@Uncensored</guid><description><![CDATA[<html><body>

<p>The big ISPs would be sure to stamp it down tho.  And i suspect the government too.</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099293800</link><pubDate>Mon, 28 Feb 2022 03:21:21 -0000</pubDate><title>Message #2099293800</title><guid isPermaLink="false">2099293800@Uncensored</guid><description><![CDATA[<html><body>

<p>Yup. That is what I mean. Something like... um.. the WPS button - but for node connecting. You could have more robust connections for those capable of implementing granular security - but something by default that would get all the morons on-board. <br /><br />Hell... you know what would be cool - if cell phones had an app built into where they could be the hop between dense urban wifi areas... so, once you got to the edge of the urban mesh, it would start hopping across cars to the next urban area. Latency would be high - because if a car didn't have a hop point... it would buffer the packets it was carrying until it got to somewhere dense. I bet you could transfer packets quickly from L.A. all the way up to Sacramento hopping along I-5 using this method. </p>
<p> </p>
<blockquote>
<div class="message_header"><span>Sun Feb 27 2022 18:54:31 EST</span> <span>from <a href="do_template?template=user_show?who=Nurb432">Nurb432</a> </span></div>
<div class="message_content">
<p>Would be neat if home routers came that way by default.   I wont hold my breath, but it would be neat.</p>
<br /><br /></div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099293787</link><pubDate>Sun, 27 Feb 2022 23:54:31 -0000</pubDate><title>Message #2099293787</title><guid isPermaLink="false">2099293787@Uncensored</guid><description><![CDATA[<html><body>

<p>Would be neat if home routers came that way by default.   I wont hold my breath, but it would be neat.</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099293784</link><pubDate>Sun, 27 Feb 2022 23:48:53 -0000</pubDate><title>Message #2099293784</title><guid isPermaLink="false">2099293784@Uncensored</guid><description><![CDATA[<html><body>

<p>Can't disagree with you there - but - the truth is, everything is zero-config plug-n-play these days. You could just opt in, it would generate a security and encryption key, and find the nearest nodes and join. <br /><br />I mean, SETI @Home - you just install a program, right? Make it that simple. <br /><br />I'm sure the ISPs are terrified of someone coming up with something like this and it being stable and useful. </p>
<p> </p>
<blockquote>
<div class="message_header"><span>Sat Feb 26 2022 12:21:58 EST</span> <span>from <a href="do_template?template=user_show?who=IGnatius T Foobar">IGnatius T Foobar</a> </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY">I've occasionally walked through New York City and observed that Starbucks could do their own mesh network. There are so many of those shops that each one is easily within reach of two or three others. Too bad the name "Starlink" is already used :) <br /><br />What's your time worth, though? Unless you're an enthusiast, it's easier to just subscribe to a consumer grade Internet service and someone else maintains it for you. Most people don;'t want to be radio operators or network operators. </div>
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099293686</link><pubDate>Sat, 26 Feb 2022 17:21:58 -0000</pubDate><title>Message #2099293686</title><guid isPermaLink="false">2099293686@Uncensored</guid><description><![CDATA[I've occasionally walked through New York City and observed that Starbucks
could do their own mesh network.  There are so many of those shops that each
one is easily within reach of two or three others.  Too bad the name "Starlink"
is already used :) 
  
 What's your time worth, though?  Unless you're an enthusiast, it's easier
to just subscribe to a consumer grade Internet service and someone else maintains
it for you.  Most people don;'t want to be radio operators or network operators.

]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099293414</link><pubDate>Thu, 24 Feb 2022 07:27:15 -0000</pubDate><title>Message #2099293414</title><guid isPermaLink="false">2099293414@Uncensored</guid><description><![CDATA[<html><body>

<p>My idea is already implemented on some small scale in isolated urban areas... but when I moved to Arizona, I realized you could hop from one side of the city to the other without EVERY touching an ISP if there were commercial solutions built into home routers that would allow them to safely share bandwidth with other nearby routers. A one-button, opt-in solution. It would give you VPN like protections *and* avoid congestion *and* bypass ISP usage caps. <br /><br />And once you got to edge areas, you could logically bind lots of those routers to make an alternate backbone that would then tunnel through the ISP hops to nodes on the other side, in the next metro area - without consuming one participant's bandwidth. <br /><br />You could really make it so that the part where you hopped on the ISP for a big hop - they wouldn't really be able to stop it. Almost like torrents work. <br /><br />It seems like it would be more fault tolerant and easier to avoid censorship than the current TCP/IP implementation, 
<p><br /><br /></p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099293270</link><pubDate>Tue, 22 Feb 2022 23:50:02 -0000</pubDate><title>Message #2099293270</title><guid isPermaLink="false">2099293270@Uncensored</guid><description><![CDATA[<html><body>

<p>If my area was such inclined, i would setup a spare router to join in a mesh. ( or a spare machine, if my router couldn't do it )</p>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099293267</link><pubDate>Tue, 22 Feb 2022 23:33:11 -0000</pubDate><title>Message #2099293267</title><guid isPermaLink="false">2099293267@Uncensored</guid><description><![CDATA[In other news, my home router has been upgraded to RouterOS 7.1.3, and I've
already got three WireGuard tunnels up and running.  It's REALLY easy.  You
just put in your private key, the other end's public key, the address/port
if they're static, and the allowed addresses.  BOOM it's up and running the
moment you click Apply. 
  
 Now my Pi doesn't have to be used for WireGuard anymore.  It's just being
used as an I2P router, and to test ARM builds of Citadel. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099293260</link><pubDate>Tue, 22 Feb 2022 23:14:49 -0000</pubDate><title>Message #2099293260</title><guid isPermaLink="false">2099293260@Uncensored</guid><description><![CDATA[It basically is a mesh.  The design behind most of them involves a centralized
control plane at a well-known address, with the actual data paths being peer
to peer.  The control plane is used for nodes to locate each other and share
their public keys, so even if they are moving around or behind third party
firewalls, they can still connect to the mesh. 
  
 Yes, the control plane is a potential choke point.  The current designs are
not built to resist authority; that's what a darknet is for.  They're intended
to replace traditional VPNs by building a full mesh to every single node,
so you don't have to route everything through central hubs.  I'm sure if someone
wanted to build a cancel-resistant DPN they could put the control plane onto
a blockchain, or perhaps you have to know the address of at least one node
through which you can learn the rest, like a BitTorrent service. 
  
 PD's idea
of a public wifi mesh network is already reality: [ https://www.nycmesh.net/
] and probably others.  It's basically a bunch of volunteers coordinating
a WireGuard overlay over rooftop WiFi routers.  There are probably efforts
in other locations too.  The technology to run it is well understood but it
does take some effort to build and maintain. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099293258</link><pubDate>Tue, 22 Feb 2022 22:48:24 -0000</pubDate><title>Message #2099293258</title><guid isPermaLink="false">2099293258@Uncensored</guid><description><![CDATA[<html><body>

<p>For wifi they call that mesh..</p>
<p> </p>
<p>But ultimately somewhere , someone has to get on the backbone..</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099293193</link><pubDate>Tue, 22 Feb 2022 16:33:47 -0000</pubDate><title>Message #2099293193</title><guid isPermaLink="false">2099293193@Uncensored</guid><description><![CDATA[<html><body>

<p>Distributed Private Networks. <br /><br />Hardware based solutions where you go out, encrypted, to other devices, and then on to your destination. Kind of a hardware TOR solution, I guess. <br /><br />It is kind of a variation of my idea where we could bypass the ISPs and the authoritative segments of the Internet completely because of the ubiquitous nature of WiFi in dense urban and suburban areas. You would need a router that would act as a node, and all your neighbors would have the same router/nodes - and it would just get passed on from router to router to its destination. Big hops would require jumping onto their infrastructure still, I suppose - but you would basically share your bandwidth with everyone. <br /><br />I feel like the infrastructure to blow 5G out of the water is probably already installed in almost every house on every block - we just have to get the packet handling built into that hardware. </p>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099293183</link><pubDate>Tue, 22 Feb 2022 14:12:54 -0000</pubDate><title>Message #2099293183</title><guid isPermaLink="false">2099293183@Uncensored</guid><description><![CDATA[  
 Follow up to the previous post: 
  
 It looks like there are a bunch of free alternatives to Tailscale: headscale,
nebula, zerotier, netmaker, to name a few. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099293015</link><pubDate>Sun, 20 Feb 2022 23:41:13 -0000</pubDate><title>Message #2099293015</title><guid isPermaLink="false">2099293015@Uncensored</guid><description><![CDATA[I thought it was you, but I couldn't quite remember exactly and I didn't want
to credit the wrong person.  I really, really like the Mikrotik product line.
 I'm running the hEX RB750Gr3 (wired only) as the core router, and three of
the hAP Lite RB941-2nD access points around the house.  I like that they run
the same software and can be configured as routers unto themselves, or as
managed access points with a couple of extra switch ports for nearby wired
devices, which is how I have them set up. 
  
 I'm not familiar with DPN either, but a quick web search corroborates Nurb's
suggestion that it is a skin condition.  :) 
  
 Seriously though, it looks like the idea of a Decentralized Private Network
is that it's a generic term for what most people call overlay networks, with
its participants either self-organizing or privately organizing, and assembling
a mesh of encrypted tunnels *over* the
public Internet instead of communicating over the mainstream channels.  Obviously
that makes a lot of sense to a crowd like us, who have zero trust for the
tech giants and assume that they have bad intentions 100% of the time. 
  
 I'd divide these into two categories: 
  
 Category 1: online media that is federated, decentralized, and free of choke
points that the purple-haired cancel twats can use to silence participants
who fail to toe the line.  Between anonymous networks like I2P and Tor, and
highly-federated networks like Mastodon, there is a permanent place for these.

  
 Category 2: virtual private networks that don't depend on hubs.  If you need
something like this for a corporate network, you can check out Tailscale,
which is doing exactly that.  It's a DPN based on WireGuard protocol but built
like a gaming network -- everyone connects to a central hub only for endpoint
location
and key exchange, but the data path is actually a full mesh of WireGuard tunnels.
 It remains secure because no one ever has to share their private key.  Everyone
can be on a dynamic IP address as well.  They have a free tier if you just
want to play around. 
  
 So yes, I think this kind of thing is definitely viable and will have an
important role to play. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099292991</link><pubDate>Sun, 20 Feb 2022 18:48:15 -0000</pubDate><title>Message #2099292991</title><guid isPermaLink="false">2099292991@Uncensored</guid><description><![CDATA[ > 2022-02-19 23:55 from IGnatius T Foobar     
 >I don't remember who it was, but someone here turned me on to Mikrotik,
   
 >which I now use exclusively for my home networking needs.  Tonight I   
 
 >discovered that the long-awaited RouterOS v7 is finally out of beta.   
  
 >This is a big deal for me because v7 has WireGuard VPN built right into
   
 >the router software.    
 > At the moment I have my tunnels built out from a Raspberry Pi acting  
  
 >as a VPN router.  After the v7 upgrade I won't have to do that anymore.
   
 >    
 >     
 >    
    
 It was me. Thanks for asking.   
  
 I am so glad you are liking the stuff. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099292990</link><pubDate>Sun, 20 Feb 2022 18:44:15 -0000</pubDate><title>Message #2099292990</title><guid isPermaLink="false">2099292990@Uncensored</guid><description><![CDATA[<html><body>

<p>Dermatois Papulosa Nigra? </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099292967</link><pubDate>Sun, 20 Feb 2022 13:29:23 -0000</pubDate><title>Message #2099292967</title><guid isPermaLink="false">2099292967@Uncensored</guid><description><![CDATA[<html><body>

<p>Speaking of VPN - what are your thoughts about DPN? <br /><br />It sounds kind of like my concept of using shared-nodes to bypass ISP providers almost completely. </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099292921</link><pubDate>Sun, 20 Feb 2022 04:55:50 -0000</pubDate><title>Message #2099292921</title><guid isPermaLink="false">2099292921@Uncensored</guid><description><![CDATA[I don't remember who it was, but someone here turned me on to Mikrotik, which
I now use exclusively for my home networking needs.  Tonight I discovered
that the long-awaited RouterOS v7 is finally out of beta.  This is a big deal
for me because v7 has WireGuard VPN built right into the router software.
 At the moment I have my tunnels built out from a Raspberry Pi acting as a
VPN router.  After the v7 upgrade I won't have to do that anymore. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099282758</link><pubDate>Thu, 18 Nov 2021 14:18:20 -0000</pubDate><title>Message #2099282758</title><guid isPermaLink="false">2099282758@Uncensored</guid><description><![CDATA[ > cable providers use multicast for some set-top-box stuff, but that's  

 >all internal and hidden from the user.     
  
 Right.  AT&T (sorry ... "at&t") uses multicast to distribute video on their
hybrid and fiber services.  It's true video over IP and it's possible because
they control the entire network from the head end to the decoder box.  When
a subscriber "tunes in" to a channel, the decoder joins the multicast group
for that channel, and then all the routers between the subscriber and the
head end begin transmitting the payload data.  It's *very* tricky to maintain,
but it uses the bandwidth efficiently, because if a second subscriber tunes
in to the same channel, it doesn't have to open a second stream. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099282478</link><pubDate>Mon, 15 Nov 2021 21:38:55 -0000</pubDate><title>Message #2099282478</title><guid isPermaLink="false">2099282478@Uncensored</guid><description><![CDATA[    
 cable providers use multicast for some set-top-box stuff, but that's all
internal and hidden from the user.   
  
  
 I don't think a lot of end-user connections will have multi-cast available
until IPv6 becomes the norm (if it ever does)... 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099282376</link><pubDate>Sun, 14 Nov 2021 23:13:34 -0000</pubDate><title>Message #2099282376</title><guid isPermaLink="false">2099282376@Uncensored</guid><description><![CDATA[ >Unless you run a public network... Why would multicast even get into  
 >your environment if its not used?   
  
 Good point, sciens ... you actually have to work really hard to route multicast,
so much so that unless you are really trying hard to make a multicast application
work across multiple subnets, you're not even going to be trying a little
bit to set it up. 
  
 Plenty of applications will make use of multicast on the *local* segment,
but that's not really the same thing. 
  
 I wonder if they simply meant that they were dealing with a large-scale Layer
2 broadcast storm on multiple networks.  That, unfortunately, happens to a
lot of people, even if you have somewhat experienced network people.  Everyone
usually experiences this at least once in their career if they are in the
routing-and-switching area.  Quite often it comes from mixing different protocols
for "spanning tree on
multiple vlans".  For example if you mix PVST and MSTP on the same wire, you
are headed directly into a broadcast storm that knocks out the entire network
-- and it might not even happen immediately; some random little change later
on might set it off. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099281184</link><pubDate>Sun, 31 Oct 2021 13:34:49 -0000</pubDate><title>Message #2099281184</title><guid isPermaLink="false">2099281184@Uncensored</guid><description><![CDATA[<html><body>

<p>Oh, and i'm not really giving away any corporate secrets, stuff like this is public record for us, due to who we are. ( now the details, not so much.. )</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099281179</link><pubDate>Sun, 31 Oct 2021 12:45:24 -0000</pubDate><title>Message #2099281179</title><guid isPermaLink="false">2099281179@Uncensored</guid><description><![CDATA[<html><body>

<p>While its not a "pubic network", we do have some public sites we host ourselves, but they are translated from something like 4 external IPs. Bunch of site-to-site VPNs both to cloud providers and vendor sites. That is what burnt us last time, we let a end point broadcast DHCP back into our network, and had an overlapping range. Some forgot to restrict that at the firewall.. Should have been SoP.</p>
<p>I dont know enough of why we had multicast turned on, or why turning it off wont hurt us if it was on for a reason.</p>
<p>We do have some 30k computers, mixed of WiFi and Ethernet, perhaps 10k servers. Guessing 20k cell phones on WiFi across several thousand sites. 15k or so hardwired VoIP phones. 2 remote datacenters, far enough away from each other that common weather or a nuclear hit wont effect all 3 at once..We do have various 'phone extender' things from ATT and Version spread around the buildings, especially in basements. Few thousand remote mobiles ( cars, trucks, etc ), on cell data back home via VPN. Tons of people coming back in from home via VPN. Lots of stuff.. everywhere...</p>
<p>Wait, we do offer public WiFi i guess with easy 20k more connections.. But ts a separate network, at least its supposed to be, so it shouldn't conflict? </p>
<p> </p>
<p>I will give them credit for keeping this mess alive, but when they do basic mistakes like this.. its frustrating.</p>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099281168</link><pubDate>Sun, 31 Oct 2021 10:43:06 -0000</pubDate><title>Message #2099281168</title><guid isPermaLink="false">2099281168@Uncensored</guid><description><![CDATA[<html><body>

<p>Unless you run a public network... Why would multicast even get into your environment if its not used?</p>
<p>Since it was disabled it leads me to believe that multicast serves no function.... SO it sounds like a cop-out.</p>
<blockquote>
<div class="message_header"><span>Tue Oct 26 2021 18:13:45 EDT</span> <span>from <a href="do_template?template=user_show?who=Nurb432">Nurb432</a> </span></div>
<div class="message_content">
<p>Total collapse of our network, again.  Sounds like more mis-management/incompetence? Or am i just in a bad mood and its not really their fault?</p>
<p>This time:</p>
<p>"<span style="font-family: 'Segoe UI', system-ui, 'Apple Color Emoji', 'Segoe UI Emoji', sans-serif; font-size: 14px;">A multicast storm into the core caused the routing process to fail. Disabling multicast routing resolved the issues"</span></p>
<br /><br /></div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099280957</link><pubDate>Thu, 28 Oct 2021 20:31:25 -0000</pubDate><title>Message #2099280957</title><guid isPermaLink="false">2099280957@Uncensored</guid><description><![CDATA[<html><body>

<p>That my feelings too. But they are not new, but after the last 2 mistakes, they should be gone.</p>
<blockquote>
<div class="message_header"><span>Thu Oct 28 2021 09:36:13 AM EDT</span> <span>from <a href="do_template?template=user_show?who=IGnatius T Foobar">IGnatius T Foobar</a> </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY">Sounds like inexperienced network administrators to me. Most of us make those rookie mistakes at some point. </div>
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099280932</link><pubDate>Thu, 28 Oct 2021 13:36:13 -0000</pubDate><title>Message #2099280932</title><guid isPermaLink="false">2099280932@Uncensored</guid><description><![CDATA[Sounds like inexperienced network administrators to me.  Most of us make those
rookie mistakes at some point. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099280803</link><pubDate>Tue, 26 Oct 2021 22:13:45 -0000</pubDate><title>Message #2099280803</title><guid isPermaLink="false">2099280803@Uncensored</guid><description><![CDATA[<html><body>

<p>Total collapse of our network, again.  Sounds like more mis-management/incompetence? Or am i just in a bad mood and its not really their fault?</p>
<p>This time:</p>
<p>"<span style="font-family: 'Segoe UI', system-ui, 'Apple Color Emoji', 'Segoe UI Emoji', sans-serif; font-size: 14px;">A multicast storm into the core caused the routing process to fail. Disabling multicast routing resolved the issues"</span></p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099279717</link><pubDate>Wed, 13 Oct 2021 23:13:49 -0000</pubDate><title>Message #2099279717</title><guid isPermaLink="false">2099279717@Uncensored</guid><description><![CDATA[<html><body>

<p>Right,that was my idea with AWS. 70 bucks a year, pretty quick to setup. </p>
<blockquote>
<div class="message_header"><span>Wed Oct 13 2021 05:29:59 PM EDT</span> <span>from <a href="do_template?template=user_show?who=IGnatius T Foobar">IGnatius T Foobar</a> </span></div>
<div class="message_content">
<p>Keep your eyes open.  Although I hope to keep using Ace forever, it would be nice to have a backup.</p>
<p>Of course, I suppose one possibility would be to just get a cheap VPS from a provider somewhere, and just use it as a front end router.</p>
<br /><br /></div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099279710</link><pubDate>Wed, 13 Oct 2021 21:29:59 -0000</pubDate><title>Message #2099279710</title><guid isPermaLink="false">2099279710@Uncensored</guid><description><![CDATA[<html><body>

<p>Keep your eyes open.  Although I hope to keep using Ace forever, it would be nice to have a backup.</p>
<p>Of course, I suppose one possibility would be to just get a cheap VPS from a provider somewhere, and just use it as a front end router.</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099279569</link><pubDate>Mon, 11 Oct 2021 18:20:42 -0000</pubDate><title>Message #2099279569</title><guid isPermaLink="false">2099279569@Uncensored</guid><description><![CDATA[<html><body>

<p>You could be right - I didn't pay a lot of attention to the details in the explanation. I'd have to go back and read for comprehension. :) </p>
<p><br /><br /></p>
<blockquote>
<div class="message_header"><span>Mon Oct 11 2021 08:30:40 EDT</span> <span>from <a href="do_template?template=user_show?who=Nurb432">Nurb432</a> </span></div>
<div class="message_content">
<p>Normally i would agree, but it sounds like you have to do port mapping, and currently, their apps dont support it...  So in this case i have to take his word for it.  Not going to pony out $ just to see.. </p>
<br /><br /></div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099279549</link><pubDate>Mon, 11 Oct 2021 12:30:40 -0000</pubDate><title>Message #2099279549</title><guid isPermaLink="false">2099279549@Uncensored</guid><description><![CDATA[<html><body>

<p>Normally i would agree, but it sounds like you have to do port mapping, and currently, their apps dont support it...  So in this case i have to take his word for it.  Not going to pony out $ just to see.. </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099279530</link><pubDate>Mon, 11 Oct 2021 05:15:07 -0000</pubDate><title>Message #2099279530</title><guid isPermaLink="false">2099279530@Uncensored</guid><description><![CDATA[<html><body>

<p>I think you take people more at their word, and I believe their word is usually just them CYA and frequently you have to read between the lines... <br /><br />Which is why I'm a "better to ask forgiveness than permission," kind of guy. </p>
<p> </p>
<blockquote>
<div class="message_header"><span>Sun Oct 10 2021 18:35:27 EDT</span> <span>from <a href="do_template?template=user_show?who=Nurb432">Nurb432</a> </span></div>
<div class="message_content">
<p>to me "at some point" implies it wont work, yet</p>
<br /><br /></div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099279518</link><pubDate>Sun, 10 Oct 2021 22:35:27 -0000</pubDate><title>Message #2099279518</title><guid isPermaLink="false">2099279518@Uncensored</guid><description><![CDATA[<html><body>

<p>to me "at some point" implies it wont work, yet</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099279517</link><pubDate>Sun, 10 Oct 2021 22:34:45 -0000</pubDate><title>Message #2099279517</title><guid isPermaLink="false">2099279517@Uncensored</guid><description><![CDATA[<html><body>

<p>So this reads, "You can do it, but we don't want to know about it, and we won't help you if it doesn't work." </p>
<p> </p>
<blockquote>
<div class="message_header"><span>Sun Oct 10 2021 18:20:13 EDT</span> <span>from <a href="do_template?template=user_show?who=Nurb432">Nurb432</a> </span></div>
<div class="message_content">
<p>Looks like its 'outbound' only for the time being, but may be on their radar at least..</p>
<p> </p>
<p>"I appreciate your interest with our Dedicated IP, however port forwarding is not yet supported for this feature. In addition, web hosting though may be possible with using our VPN at some point, this is still not supported on our end. "</p>
<br /><br /></div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099279515</link><pubDate>Sun, 10 Oct 2021 22:20:13 -0000</pubDate><title>Message #2099279515</title><guid isPermaLink="false">2099279515@Uncensored</guid><description><![CDATA[<html><body>

<p>Looks like its 'outbound' only for the time being, but may be on their radar at least..</p>
<p> </p>
<p>"I appreciate your interest with our Dedicated IP, however port forwarding is not yet supported for this feature. In addition, web hosting though may be possible with using our VPN at some point, this is still not supported on our end. "</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099279512</link><pubDate>Sun, 10 Oct 2021 21:37:33 -0000</pubDate><title>Message #2099279512</title><guid isPermaLink="false">2099279512@Uncensored</guid><description><![CDATA[<html><body>

<p>there?  arrgh.  im tired. i know better, and i am not illiterate. .   *Their*</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099279511</link><pubDate>Sun, 10 Oct 2021 21:34:27 -0000</pubDate><title>Message #2099279511</title><guid isPermaLink="false">2099279511@Uncensored</guid><description><![CDATA[<html><body>

<p>I sent a note off to there support people.  Will let you know what they say.</p>
<p>I was looking at AWS pricing the other day, looks like its somewhere around 70 bucks a year for a 'base' Linux VM on EC2.  I wonder if that might not be an option?</p>
<blockquote>
<div class="message_header"><span>Sun Oct 10 2021 05:15:01 PM EDT</span> <span>from <a href="do_template?template=user_show?who=IGnatius T Foobar">IGnatius T Foobar</a> </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY">Find out if they allow servers. I haven't found anyone other than Ace who allows servers, and I would love to have a backup option in case anything ever happens to Ace. </div>
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099279510</link><pubDate>Sun, 10 Oct 2021 21:15:01 -0000</pubDate><title>Message #2099279510</title><guid isPermaLink="false">2099279510@Uncensored</guid><description><![CDATA[Find out if they allow servers.  I haven't found anyone other than Ace who
allows servers, and I would love to have a backup option in case anything
ever happens to Ace. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099279465</link><pubDate>Sat, 09 Oct 2021 16:57:32 -0000</pubDate><title>Message #2099279465</title><guid isPermaLink="false">2099279465@Uncensored</guid><description><![CDATA[<html><body>

<p>Never noticed this, but apparently my VPN service i use offered a 'static ip' option. Was setting up my phone and saw the option " apply key here "...   Might look into that to see how much, could be an option to stick some of my servers back on the open-net and not get DoSed to death. ( they are openvpn based, so no funny stuff needed )</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099279464</link><pubDate>Sat, 09 Oct 2021 16:36:30 -0000</pubDate><title>Message #2099279464</title><guid isPermaLink="false">2099279464@Uncensored</guid><description><![CDATA[<html><body>

<p>lol. ran across a set of netware 3.2 manuals and guides in the garage.    ( i was a certified netware dude at one point in the 90's mostly useless but it did get me one job i guess )</p>
<p> </p>
<p>no, wont donate those, into the recycle bin they go.</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099278087</link><pubDate>Tue, 21 Sep 2021 21:47:39 -0000</pubDate><title>Message #2099278087</title><guid isPermaLink="false">2099278087@Uncensored</guid><description><![CDATA[<html><body>

<p>Cool. While it would not be my first choice, but it could provide an option in a pinch where moving their router wasn't practical.  If i ever needed to go down that route. The 2 things that is appealing to me would be not having to expose my home IP, and the 5mb bandwidth limitation to avoid a general DoS. </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099278083</link><pubDate>Tue, 21 Sep 2021 21:24:42 -0000</pubDate><title>Message #2099278083</title><guid isPermaLink="false">2099278083@Uncensored</guid><description><![CDATA[It went something like this: 
  
 1. Subscribe to the service and test it with their router. 
 2. Ask them for the tunnel passwords, get a reply that they don't support
anything except their own router, promise to not ask for support, they eventually
supply the passwords, but not before I did a password recovery on the router
and extracted the tunnel credentials myself. 
 3. Install a virtual machine with interfaces on two networks: one to the
public Internet, and one on the network where the hosted servers will live.
 Mine is running Ubuntu 20. 
 4. Install "xl2tpd".  I had to install it from source, for two reasons: (1)
there is a bug in the kernel L2TP that makes it not work right with this service,
but xl2tpd can be compiled to use its own userspace implementation; and (2)
my password has some "#" characters in it, and I had to disable that being
parsed as a comment. 
 5. Install pppd.
 The stock one from the repo is fine. 
 6. Set the inside network interface to the IPv4 and IPv6 gateways for the
hosted network. 
 7. Configure L2TP and PPP.  This takes a *lot* of fiddling around, because
Ace does something a bit weird: they use *different* credentials for the L2TP
session and the PPP session. 
  
 (A side note here -- they actually set up two tunnels, one for router management
and one for you to actually use.  You can disable the management session and
use it as your first test.) 
  
 Therer are a lot of PPP options to mess around with.  Basically you have
to tell it that you don't require authentication from their end, but we do
have to send authentication to them, using CHAP.  And you want to tell it
to let the other end set both the local and remote ppp interface addresses,
for both ipv4 and ipv6. 
  
 I added a script of my own to /etc/ppp/ip-up.d/ that handles a
bit of routing.  Basically I have it sending all traffic through the tunnel
except for the tunnel endpoint itself.  I will probably play around with this
a bit.  I'd like to try moving the ppp interface and the inside network into
a separate namespace once the tunnel is established, so the VM itself still
has Internet access.  Oh, and you have to enable IP forwarding on the Linux
machine, of course. 
  
 Obviously, the message for most people here is "just use their router, it's
easier".  And it really is.  I went through all of this work because (1) I
wanted to send the workload over to a place where I could not send the physical
router; and (2) I am just that kind of nerd.  Most people who subscribe to
this service will probably be like PD, with separate server hardware attached
to the switch ports on the router, and very happy with that arrangement. 
For me, with decades of data center
experience, the virtual overlay network is more to my liking. 
  
 But if anyone *does* want to do it my way, I would be happy to share an image
of the virtual router. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099278074</link><pubDate>Tue, 21 Sep 2021 20:33:04 -0000</pubDate><title>Message #2099278074</title><guid isPermaLink="false">2099278074@Uncensored</guid><description><![CDATA[<html><body>

<p>So i have to ask, how did you pull off doing it in a vm.  </p>
<p>While i have business class fiber so i dont *need* it.  Might come in handy in the future. </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099277964</link><pubDate>Tue, 21 Sep 2021 01:37:27 -0000</pubDate><title>Message #2099277964</title><guid isPermaLink="false">2099277964@Uncensored</guid><description><![CDATA[<html><body>

<p>Agreed. I am not backwoods either - and have the same issue as Nurb. In large metro areas, if you want a static IP that you can open ports on to host, you're considered a business, and you pay business rates. <br /><br /><br />Even for a little hobbyist Citadel BBS. <br /><br /><br />Ace resolves this. They sent me a router, I hooked it up, asked them a few questions, got everything sorted and it just works. I pay $15 a month, they don't ask, I don't ask - my ISP just sees a VPN tunnel. It is all pretty awesome.</p>
<p> </p>
<blockquote>
<div class="message_header"><span>Mon Sep 20 2021 15:39:44 EDT</span> <span>from <a href="do_template?template=user_show?who=IGnatius T Foobar">IGnatius T Foobar</a> </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY">
<blockquote>How much stock from Ace do you own? </blockquote>
<br /><br />All of this is to say, I have no financial interest in Ace, I am just a very happy customer. I want other people to subscribe to their service because I want the service to be around for a long time. </div>
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099277906</link><pubDate>Mon, 20 Sep 2021 19:39:44 -0000</pubDate><title>Message #2099277906</title><guid isPermaLink="false">2099277906@Uncensored</guid><description><![CDATA[ > How much stock from Ace do you own?     
  
 I think they're a privately held company, actually.  They're just an ordinary
service provider in NYC.  From 2001 through 2009 they were my ADSL provider
at home, static IP and no port blocking in a place where that was not a common
practice.  Then when everything went to fiber, Verizon pulled a scumbag move
and declared that fiber didn't count as one of the unbundled elements they
were required to offer as part of the 1996 deregulation agreement.  This of
course screwed all of the CLECs who depended on Verizon for the last-mile
attachment. 
  
 The static IP VPN service is basically their way around that problem.  It
basically uses the Internet itself as the carriage between them and the subscriber.
 In fact, as far as I can tell, it lands the subscriber on the exact same
access server they are using for ADSL subscribers, but instead of the
L2TP connection coming from Verizon, it comes directly from the subscriber's
physical location over a third party network. 
  
 This works well for me because the *actual* location of the servers has some
protection from anyone who might want to inflict harm upon it.  It's capped
at 5 Mbps and there are no inbound ports open.  Last year I was frightened
by a spam email, which turned out to be a hoax (as they usually are), that
claimed I was going to get a massive and sustained DDoS unless I gave them
a bunch of Bitcoin.  As unlikely as this was, I couldn't take a chance, because
I am employed by the company that operates the data center, and that would
have attracted a lot of undue attention -- even though I have permission
for it to be there. 
  
 Now, all of my web properties are in a network address space owned and operated
by Ace, regardless of where the physical servers are actually
connected.  And furthermore, now that I've virtualized the router, I can move
everything between physical sites just by copying over all of the virtual
machines and spinning up the virtualized router in whichever location I want
to run. 
  
 All of this is to say, I have no financial interest in Ace, I am just a very
happy customer.  I want other people to subscribe to their service because
I want the service to be around for a long time. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099277875</link><pubDate>Mon, 20 Sep 2021 12:55:59 -0000</pubDate><title>Message #2099277875</title><guid isPermaLink="false">2099277875@Uncensored</guid><description><![CDATA[<html><body>

<p>Im not 'back woods' and here, our entire neighborhood is NATed by default.   So no direct open ports for you unless you pony up more $. Sure its doable, but then you are getting into business service territory, and doing the VPN may be cheaper, or at least competitive, AND you dont risk your home connection to DoS attack. </p>
<p>My hosting provider for web/email ( business class ) limits number of emails going out, unless you pay more. Hell even O365 has limits that prevents me from using it at the office for the application i support ( i send out perhaps 300k messages a business day.. easy )</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099277870</link><pubDate>Mon, 20 Sep 2021 12:11:56 -0000</pubDate><title>Message #2099277870</title><guid isPermaLink="false">2099277870@Uncensored</guid><description><![CDATA[ > So ... once again, if anyone wants to run a "home data center" or     
 >anything else that requires static IP addresses with no port blocking, 
   
 >I continue to strongly recommend aceinnovative.com Static IP VPN     
 >product.  It is excellent.    
 > 5 Mbps, /29 IPv4, /64 IPv6, tunneled back to their data center using a
   
 >router they provide at no additional cost, $15 for home users, $25 for 
   
 >business users.     
    
 How much stock from Ace do you own?   
  
 My country counts as a technological shithole and we can still get public
static (or pseudostatic) IP addresses with no port blocking or anything. Me
get some traffic throtling if we abuse some protocol, but that is to be expected.
I mean, not many users have a legit reason to deliver 400 emails per minute...

]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099277763</link><pubDate>Sun, 19 Sep 2021 13:00:26 -0000</pubDate><title>Message #2099277763</title><guid isPermaLink="false">2099277763@Uncensored</guid><description><![CDATA[<html><body>

<p>I dont know what it is, it has a sign that says 'antminer'  :)    Nah, id not actually seriously ask anyone to do that, they suck a lot of power at full speed ( about 2k watts each box, which i cant do here without melting my power bill, so only running one these days, low hash rate ). but having free power and cooling would be nice :) </p>
<p>Buying solar panels and batteries one at time to put up next year for at least one of them, still at a low hash rate tho. But i'm still tied to weather as they are in the garage, to keep them out of the weather. Ifit gets above 90 i have to shut them down.  ( or move them inside and heat my house up, and run my AC costs up ).  Except for the noise, they make great space heaters in the winter tho.</p>
<p>Every time i see a empty power socket in the park or a solar farm or something i keep thinking, i wonder if i could back the jeep up to it and plug in for a few hours.  lol</p>
<p>Would love to be able to run 1000 of them in a building. make it a full time job.</p>
<blockquote>
<div class="message_header"><span>Sat Sep 18 2021 11:48:06 PM EDT</span> <span>from <a href="do_template?template=user_show?who=IGnatius T Foobar">IGnatius T Foobar</a> </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY">Is it a Tor exit node? :) <br /><br /></div>
</div>
</blockquote>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099277759</link><pubDate>Sun, 19 Sep 2021 11:48:58 -0000</pubDate><title>Message #2099277759</title><guid isPermaLink="false">2099277759@Uncensored</guid><description><![CDATA[<html><body>

<p>Too bad you couldn't return the hardware to them and get a discount on the service.</p>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099277736</link><pubDate>Sun, 19 Sep 2021 03:48:06 -0000</pubDate><title>Message #2099277736</title><guid isPermaLink="false">2099277736@Uncensored</guid><description><![CDATA[Is it a Tor exit node?  :) 
  
 Regrettably, I don't have carte blanche to just throw anything in there.
 I am thankful to have my one 2U server, and I don't make a lot of noise about
it.  It's hosting an open source project, which is reasonable since I am an
IT Architect and it's a great way to keep the skill set up to date. 
  
 One of our big lines of business is disaster recovery services, so I happen
to know quite a bit about that.  I maintain that kind of practice for my own
servers.  Now that the VPN router is virtual, I can replicate it to the recovery
site (my home) along with all of the other VMs, and everything just runs wherever
it happens to be. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099277650</link><pubDate>Fri, 17 Sep 2021 20:25:59 -0000</pubDate><title>Message #2099277650</title><guid isPermaLink="false">2099277650@Uncensored</guid><description><![CDATA[<html><body>

<p>Since you have access to a air conditioned datacenter, i have something you can plug in for me. Its cooling fans are a little noisy but wont take up hardly any bandwidth when running. a few M a day at the most.. And in a full sized DC you wont hear the noise anyway.</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099277647</link><pubDate>Fri, 17 Sep 2021 20:03:45 -0000</pubDate><title>Message #2099277647</title><guid isPermaLink="false">2099277647@Uncensored</guid><description><![CDATA[Ok, so after discovering that IPv6 wasn't working, I put the supplied router
back in, discovered that IPv6 still didn't work, opened a support ticket,
saw IPv6 magically spring to life after they fixed it, and now I've switched
back to the software router.  Understandably, they only provide support for
the router supplied with the service. 
  
 In case anyone is wondering about the state of L2TP on Linux: this is L2TPv2,
which is not quite as common anymore.  I am using "xl2tpd" downloaded directly
from the upstream site, and compiled it myself, selecting their userspace
implementation of L2TP because there is apparently a bug in the kernel version.
 I also had to hack the configuration parser to not read "#" as a comment,
because my password has a few of those in it  :( 
  
 There are patches out there that claim to add IPv6 support.  It turns out
this is not necessary, as I suspected. 
The patches are for running the *tunnel* over an IPv6 network.  Transport
of traffic *inside* the tunnel is handled by the kernel PPP driver, which
has supported IPv4/IPv6 for a long time. 
  
 So ... once again, if anyone wants to run a "home data center" or anything
else that requires static IP addresses with no port blocking, I continue to
strongly recommend aceinnovative.com Static IP VPN product.  It is excellent.
 5 Mbps, /29 IPv4, /64 IPv6, tunneled back to their data center using a router
they provide at no additional cost, $15 for home users, $25 for business users.

  
 I am a very happy nerd right now.  I will probably run things like this for
a couple of days just to make sure there are no other issues with the virtual
router, and then send everything back over to the raised floor. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099277558</link><pubDate>Fri, 17 Sep 2021 00:02:00 -0000</pubDate><title>Message #2099277558</title><guid isPermaLink="false">2099277558@Uncensored</guid><description><![CDATA[  
 Nice! 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099277556</link><pubDate>Thu, 16 Sep 2021 23:17:12 -0000</pubDate><title>Message #2099277556</title><guid isPermaLink="false">2099277556@Uncensored</guid><description><![CDATA[All right, it looks like I've got things moved over to the software router.
 Cool!   
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099277552</link><pubDate>Thu, 16 Sep 2021 21:55:28 -0000</pubDate><title>Message #2099277552</title><guid isPermaLink="false">2099277552@Uncensored</guid><description><![CDATA[<html><body>

<p>cool</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099277545</link><pubDate>Thu, 16 Sep 2021 21:19:08 -0000</pubDate><title>Message #2099277545</title><guid isPermaLink="false">2099277545@Uncensored</guid><description><![CDATA[  
 Zoinks! 
  
 I think I may have figured out how to get the Static IP VPN service from
Ace Innovative working only with software instead of using "their" router.[
 This is something I tried to do last October when I first began using the
service, but I wasn't able to get it to work.  This time around I worked a
bit more slowly and carefully, made some minor changes, and tested it a lot
using the management tunnel before attempting the payload tunnel. 
  
 I switched it over for a few minutes and ... wow, all the inbound traffic
for the citadel.org properties began arriving on the software tunnel!   (Sorry
if any of you were online just now and I interrupted your session.) 
  
 This means that I can now just keep a small virtual machine around that acts
as a VPN router, bridge it to all of my server VMs, and that entire group
of VMs can run anywhere, as long as they are together.  I am
*very* excited about this because it means I can move this stuff off my home
server.  (For those confused by this -- I have access to an excellent data
center where I can run whatever I want as long as it doesn't call attention
to itself, so this allows me to run as much capacity as I need but the Internet
presence appears, from the outside, to be on the Ace Innovative network instead
of at the server's actual location.) 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099274004</link><pubDate>Sun, 08 Aug 2021 15:04:59 -0000</pubDate><title>Message #2099274004</title><guid isPermaLink="false">2099274004@Uncensored</guid><description><![CDATA[<html><body>

<p>i do think its more than that, since they also do GUIs and stuff.</p>
<p>Agreed a lot of it talks via an API, but the 'toolkit' lets you build what happens after the data is collected</p>
<p> </p>
<p>not a fan, but its an end-to-end thing</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099273996</link><pubDate>Sun, 08 Aug 2021 14:49:28 -0000</pubDate><title>Message #2099273996</title><guid isPermaLink="false">2099273996@Uncensored</guid><description><![CDATA[<html><body>

<p>That sounds suspiciously like the same thing others call "serverless".</p>
<p>Enough with the silly terms.  We call that an API.</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099273686</link><pubDate>Wed, 04 Aug 2021 21:27:52 -0000</pubDate><title>Message #2099273686</title><guid isPermaLink="false">2099273686@Uncensored</guid><description><![CDATA[<html><body>

<p>Its what Microsoft has branded as their ' low code' dev stuff. All cloud hosted.  Al tied to Azure. </p>
<blockquote>
<div class="message_header"><span>Wed Aug 04 2021 09:00:51 AM EDT</span> <span>from <a href="do_template?template=user_show?who=IGnatius T Foobar">IGnatius T Foobar</a> </span></div>
<div class="message_content">
<p>WTF is a "power app" ?</p>
<br /><br /></div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099273656</link><pubDate>Wed, 04 Aug 2021 19:55:37 -0000</pubDate><title>Message #2099273656</title><guid isPermaLink="false">2099273656@Uncensored</guid><description><![CDATA[  
 Building hybrid cloud requires so much work on infrastructure-as-code...
doable, but a significant pile of work even for an application as small as
the one I work on for a living.  
  
 Then the infrastructure-as-code repo becomes the source of truth for deployment
and ops, and it's just a layer of abstraction I havent' wanted the hassle
of dealing with. I looove to be able to just keep the AWS admin console as
the source of truth for config. 
  
 Someday this company may well grow and somebody will want to shove me under
the bus and say "Yooooooou should have built somethign 10X more complicated..."
but until then my job is far easier. 
  
 We are at a tiny scale. Our application runs on one single server running
an Erlang VM. For reasons that were not my decision, we don't even have the
ability to scale *that* out rather than up. So until we can even scale-out,
load-balancing across a hybrid cloud would be beside the point. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099273631</link><pubDate>Wed, 04 Aug 2021 13:00:51 -0000</pubDate><title>Message #2099273631</title><guid isPermaLink="false">2099273631@Uncensored</guid><description><![CDATA[<html><body>

<p>WTF is a "power app" ?</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099273595</link><pubDate>Wed, 04 Aug 2021 00:17:52 -0000</pubDate><title>Message #2099273595</title><guid isPermaLink="false">2099273595@Uncensored</guid><description><![CDATA[<html><body>

<p>Oh, i dont disagree its the right thing to do.. But my vendor, they are not thinking 'ahead'.  After the move to Azure, they are going to get in bed with Microsoft even more i guess, and start using power apps with web-hooks instead of writing 'real' integration engines. </p>
<p>Rumor too is they are going to replace their native windows services ( like for workflows , emails, etc ) with power apps.  And migrate their piss-poor reporting engine to PowerBI.  ( reporting took a huge hit with this upgrade. it was not great before, now it sucks. and sucks bad.  Old days they used crystal, which i like and use every day, but it got too expensive to embed so they got some stupid delphi report tool that was 1/2 assed. Now its gone and the new one is 9/10 assed.</p>
<p> </p>
<p>( or was that logic apps? i donno, its all the same to me. Microsoft stuff. )</p>
<p> </p>
<p>All i keep thinking  is the end of my career is near..  just a little longer.</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099273586</link><pubDate>Tue, 03 Aug 2021 23:49:08 -0000</pubDate><title>Message #2099273586</title><guid isPermaLink="false">2099273586@Uncensored</guid><description><![CDATA[ > 2021-08-03 17:31 from Nurb432   
 >They wont. Its a 100% shift.   
 >  
  
 I think something we should have learnt from this year and the last one is
that you cannot put all your eggs in the basket of the same provider, specially
if your applications are tailored to that provider and not easy to migrate
to another one. I think IG is up to somethig with his mention of hybird solutions
that keep the command-and-control out of hot spots. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099273571</link><pubDate>Tue, 03 Aug 2021 21:31:07 -0000</pubDate><title>Message #2099273571</title><guid isPermaLink="false">2099273571@Uncensored</guid><description><![CDATA[<html><body>

<p>They wont. Its a 100% shift.</p>
<p>Even lost their AWS people, not hiring more.</p>
<blockquote>
<div class="message_header"><span>Tue Aug 03 2021 09:53:09 AM EDT</span> <span>from <a href="do_template?template=user_show?who=IGnatius T Foobar">IGnatius T Foobar</a> </span></div>
<div class="message_content">
<p> </p>
<blockquote>
<div class="message_content">
<p>Tho all that said, this winter ( or coming spring ) we get moved to Azure, so all bets may be off?<span style="background-color: transparent;"> </span></p>
</div>
</blockquote>
<p>The smart money would be on distributing the load between AWS *and* Azure (and elsewhere if needed), and running command and control from neither.</p>
<p>Hybrid is really hot these days.</p>
<br /><br /></div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099273537</link><pubDate>Tue, 03 Aug 2021 13:53:09 -0000</pubDate><title>Message #2099273537</title><guid isPermaLink="false">2099273537@Uncensored</guid><description><![CDATA[<html><body>

<p> </p>
<blockquote>
<div class="message_content">
<p>Tho all that said, this winter ( or coming spring ) we get moved to Azure, so all bets may be off?<span style="background-color: transparent;"> </span></p>
</div>
</blockquote>
<p>The smart money would be on distributing the load between AWS *and* Azure (and elsewhere if needed), and running command and control from neither.</p>
<p>Hybrid is really hot these days.</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099272868</link><pubDate>Sun, 25 Jul 2021 18:39:50 -0000</pubDate><title>Message #2099272868</title><guid isPermaLink="false">2099272868@Uncensored</guid><description><![CDATA[<html><body>

<p>Until your 2nd comment, I was going to say i dont know how they are doing it, its all in the vendors hands so it could have been 'magic'.  We just said ' we need static ' and they made it happen. These are via non-public addresses routing only across the VPN, but i think the public side is too. While we added friendly A record DNS entries for what they gave us on public facing, id imagine they needed to be static. Or what they gave us was an A-record type of thing on Amazon side. Donno if that is how it is, or if that would even work, as never needed to look that far into it: "its the vendors problem".  But the internal traffic is 100% IP. </p>
<p>They do have a problem that when they rebuild a server they cant pre-define the IP or set it themselves afterwards ( only the subnet ). Might get the same IP address back, but chances are slim. This hosed us a couple of times, as they forgot to tell us they did it and it changed, so everything we had internal broke. ( after the 2nd time we did open the entire subnet on the few ports we needed so down stream to us didnt need changing on the firewalls. but anything we were doing back up the VPN to them of course was hitting servers that no longer existed )</p>
<p>Tho all that said, this winter ( or coming spring ) we get moved to Azure, so all bets may be off?</p>
<p> </p>
<p> </p>
<p>Short story short of WHY we do this:</p>
<ul>
<li>They provide a web based app, hosted on windows servers + MSSQL, now under their control being hosted in their AWS cloud. It used to be on site ( had a temporary CTO that basically said ' if your vendor supports it you are moving to cloud" even if it didnt make sense for your app ). Id love to move it back. Been nothing but problems since we moved.</li>
<li>Automation on their end reaches back down to things on our network for bits and pieces. Some of it read-only some R/W. So ports have to be open. Stuff like AD, or SCCM, solar winds, on-site SQL servers and various API calls to other apps we have. Some of our apps also reach back up to their SQL But all things that do NOT go across the internet.</li>
<li>Reporting runs on site, so i have to reach back to their SQL servers. Same here, no internet access to SQL. While its technically possible of course, security team would take us about back and shoot us. The data in there is way to sensitive to allow it.</li>
<li>The front end for users, IS availble on internet. As is their API. We jumped thru hoops for several years ( unrelated to the AWS move ), and finally got approval for internet facing, IF we had SSL ( duh ), SSO + MFA. ( and its subject to be pulled at any time ) So web clients, 90% no VPN for them.   Problem is 10% of my users cant do SSO/MFA as they are not part of our Azure tenant, so they have to access the web app across the site to site VPN and be on our network, or stop using the system.   Randomly changing IPS would effect them too.  Another agency that is trying to get their own install since we are not secure enough for them to share ours, i guess they are limiting who can use SSO by login, forcing their admin logins to be onsite. In my case its AD-forest based, and not a planned restriction, i just cant do it.</li>
</ul>
<div>Being internet facing may go away soon, huge project where everyone has to re-justify it. Many are not able to. "convenience for our users" is not a valid reason anymore. </div>
<div> </div>
<div> </div>
<div>The app, holds up our entire operation, and for what it does not do native, it still ties in to pretty much every process we have, and is a major part of several other agencies too. Its as integral as email so not trivial. Ya, a single point of failure, but sometimes its hard to avoid it. So we have contingency plans in place if perhaps AWS would go away for more than a few hours, or the vendor suddenly vanished ( we mandated a daily onsite backup, + we would just rebuild the app servers locally ). </div>
<div> </div>
<div>But hey, i have a 2nd guy that works with me now. It used to be me, and only me, for almost 2 decades. Its nice to be able to take a day off once in a while. While we did sort of divide up the work between us based on module, we do know everything so can fill in once in a while.</div>
<div> </div>
<div>Long winded. sorry :)</div>
<div> </div>
<blockquote>
<div class="message_header"><span>Sun Jul 25 2021 11:58:32 AM EDT</span> <span>from <a href="do_template?template=user_show?who=LoanShark">LoanShark</a> </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY"><br />OBTW, amazon's native load-balancer product (1st-generation ELBs, 2nd-generation ALBs/NLBs) cannnot have static listen addresses. If you want that, I'm pretty sure you're rolling your own. </div>
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099272860</link><pubDate>Sun, 25 Jul 2021 16:01:56 -0000</pubDate><title>Message #2099272860</title><guid isPermaLink="false">2099272860@Uncensored</guid><description><![CDATA[  
 Crikey, I need to be careful when I say Amazon doesn't have a certain feature.
I end up eating crow because that's a moving target, and I'm already the old
guy in the room. 
  
 Amazon *can* do static public IP - on an NLB. So this article sketches out
a somewhat Rube Goldbergian method where you can use an NLB (with static IP)
to the front of all your other stuff: https://aws.amazon.com/blogs/networking-and-content-delivery/using-static-ip-addresses-for-application-load-balancers/

  
 There's more moving parts here, which sounds clunky, but you can do it. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099272859</link><pubDate>Sun, 25 Jul 2021 15:58:32 -0000</pubDate><title>Message #2099272859</title><guid isPermaLink="false">2099272859@Uncensored</guid><description><![CDATA[  
 OBTW, amazon's native load-balancer product (1st-generation ELBs, 2nd-generation
ALBs/NLBs) cannnot have static listen addresses. If you want that, I'm pretty
sure you're rolling your own. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099272858</link><pubDate>Sun, 25 Jul 2021 15:56:22 -0000</pubDate><title>Message #2099272858</title><guid isPermaLink="false">2099272858@Uncensored</guid><description><![CDATA[ >In a good cloud environment, launching a virtual machine that is  
 >intended to be persistent ought to offer an address lease that is  
 >long enough that it is essentially permanent, because in the real  
 >world, people use IP addresses.   
  
 This is the way it works in Amazon EC2: 
  
 * When you launch a machine, its internal IP is assigned dynamically but
is essentially permanent and lasts for the life of the machine. That may not
be nearly enough for people who want the ability to *relaunch* that machine
on different hardware and keep the same IP. 
 * In that case, there are things you can do in VPC to hardcode an IP. 
 * You can also get static external/public IPs with the Elastic IP feature.

  
 * But at scale, this kind of staticness may not work for every use case.
We want to keep machines ephemeral and short-lived worker bees 
 * There are use-cases like the `awsvpc` network
mode, which allows you to spin up a Docker container on ECS with its own dynamically
allocated internal IP, which are not compatible with any kind of staticness.

]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099272742</link><pubDate>Fri, 23 Jul 2021 21:22:37 -0000</pubDate><title>Message #2099272742</title><guid isPermaLink="false">2099272742@Uncensored</guid><description><![CDATA[<html><body>

<p>Which in our case, would have the static IP.  </p>
<p>I agree consumers wont care about what is behind it. .  But we care about the LB</p>
<blockquote>
<div class="message_header"><span>Fri Jul 23 2021 02:13:02 PM EDT</span> <span>from <a href="do_template?template=user_show?who=IGnatius T Foobar">IGnatius T Foobar</a> </span></div>
<div class="message_content">
<p><span style="background-color: transparent;">"Cloud native" software doesn't care because it will usually do something like start itself up and then register with a load balancer.</span></p>
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099272724</link><pubDate>Fri, 23 Jul 2021 18:13:02 -0000</pubDate><title>Message #2099272724</title><guid isPermaLink="false">2099272724@Uncensored</guid><description><![CDATA[<html><body>

<p>In a cloud environment, things like security and name services are often handled out of band.  If you're implementing their whole stack, the IP address doesn't matter a whole lot.</p>
<p>In a <em>good</em> cloud environment, launching a virtual machine that is intended to be persistent ought to offer an address lease that is long enough that it is essentially permanent, because in the real world, people use IP addresses.</p>
<p>"Cloud native" software doesn't care because it will usually do something like start itself up and then register with a load balancer.</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099272481</link><pubDate>Tue, 20 Jul 2021 23:34:05 -0000</pubDate><title>Message #2099272481</title><guid isPermaLink="false">2099272481@Uncensored</guid><description><![CDATA[<html><body>

<p>Ya, sounds like we are in different environments.  Our way would not work for you, and vise-versa </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099272471</link><pubDate>Tue, 20 Jul 2021 23:11:07 -0000</pubDate><title>Message #2099272471</title><guid isPermaLink="false">2099272471@Uncensored</guid><description><![CDATA[ > 2021-07-20 15:52 from Nurb432   
 >In our cases its specific 'apps' these people provide, so locking  
 >them down is the best way to go.   
  
 That's very different from the use-cases I've been working on for the last
10 years. I'm currently working at the second company (an app provider, I
guess you could say) where everything we do is hosted in the cloud. All our
operations. We could have hosted in a traditional colocation datacenter, but
for newly-launched businesses, the cloud has replaced that. 
  
 So from the standpoint of our operational philosophy, the goal (not always
achieved in practice, just a goal) is that every Amazon EC2 instance that
we launch (or Docker container running on an ECS cluster) is sort of an anonymous
worker bee, part of the hive. Machines may not stay around very long. In fact,
it's better if they don't, so we can relaunch it fresh, with the latest kernel
patches, and we don't get into a situation where we have a stateful machine
that has an uptime of 643 days that nobody dares to touch. 
  
 Machines should be as stateless as possible and some companies prefer to
relauinch a new EC2 instance on every deployment, just to enforce the best
practice that machine launches are always automated and scripted, never involve
manual intervention. 
  
 There's a lot more to unpack about this, but I'll stop there. We don't need,
require, or offer VPN connectivity to our customers (yet), but if we did,
I suppose we might find a way to present a static *internal* IP to them if
we had to. We can do static external IPs through Amazon's "Elastic IP" feature.

  
 What I'm suggesting here, is that for customers who demand it, a static IP
might be an abstraction that a service-provider might present, but internally
there might be a swarm of ephemeral worker bees with short-lived dynamic IPs
behind the scenes. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099272453</link><pubDate>Tue, 20 Jul 2021 19:52:23 -0000</pubDate><title>Message #2099272453</title><guid isPermaLink="false">2099272453@Uncensored</guid><description><![CDATA[<html><body>

<p>In our cases its specific 'apps' these people provide, so locking them down is the best way to go.</p>
<p>If they need to be wide open, then it happens via internet, not via VPN.  For us VPN is meant to be for restrictive, secure stuff.  So we lock it to IPs and ports. ( sometimes IP ranges.. but that would have prevented this mess the weekend too ).</p>
<p>We dont use the vendors DNS ( another security risk ) so going by name isn't an option really. Sure we can setup records in ours, but if it was going to change often, not going to add that overhead to us. And i am not even sure if our firewalls can do DNS in this case, and needs IP ( donno, i could be wrong, its not my gig. its cisco gear ). </p>
<p> </p>
<blockquote>
<div class="message_header"><span>Mon Jul 19 2021 09:01:52 PM EDT</span> <span>from <a href="do_template?template=user_show?who=LoanShark">LoanShark</a> </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY">
<blockquote>2021-07-19 18:57 from Nurb432 <br />My vendor, which uses AWS can pin their IP.  Load balancers for web <br />servers, the web servers themselves, and SQL.    <br /><br />So i disagree its unavoidable. Just demand it, and you get it. </blockquote>
<br />It can be done in principle. You can configure an explicit IP before instance launch, for example. <br /><br />But this isn't everything. Insisting on static IPs for everything would rule out whole parts of the AWS technology stack, for example you would never be able to use the `awsvpc` network mode on ECS. <br /><br />And there's a lot of dynamic/automated stuff that's considered best-practice these days which would not be able to do. </div>
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099272387</link><pubDate>Tue, 20 Jul 2021 01:01:52 -0000</pubDate><title>Message #2099272387</title><guid isPermaLink="false">2099272387@Uncensored</guid><description><![CDATA[ > 2021-07-19 18:57 from Nurb432   
 >My vendor, which uses AWS can pin their IP.  Load balancers for web  
 >servers, the web servers themselves, and SQL.      
 >  
 >So i disagree its unavoidable. Just demand it, and you get it.   
  
 It can be done in principle. You can configure an explicit IP before instance
launch, for example. 
  
 But this isn't everything. Insisting on static IPs for everything would rule
out whole parts of the AWS technology stack, for example you would never be
able to use the `awsvpc` network mode on ECS. 
  
 And there's a lot of dynamic/automated stuff that's considered best-practice
these days which would not be able to do. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099272376</link><pubDate>Mon, 19 Jul 2021 22:57:32 -0000</pubDate><title>Message #2099272376</title><guid isPermaLink="false">2099272376@Uncensored</guid><description><![CDATA[<html><body>

<p>My vendor, which uses AWS can pin their IP.  Load balancers for web servers, the web servers themselves, and SQL.   </p>
<p>So i disagree its unavoidable. Just demand it, and you get it.</p>
<p> </p>
<blockquote>
<div class="message_header"><span>Mon Jul 19 2021 06:19:22 PM EDT</span> <span>from <a href="do_template?template=user_show?who=LoanShark">LoanShark</a> </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY">
<blockquote>2021-07-19 15:13 from Nurb432 <br />If you have dynamic addresses on servers, you are doing it wrong ( at <br />least in my book ). </blockquote>
<br />That's just the way it is, in the cloud, it's unavoidable. </div>
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099272372</link><pubDate>Mon, 19 Jul 2021 22:19:22 -0000</pubDate><title>Message #2099272372</title><guid isPermaLink="false">2099272372@Uncensored</guid><description><![CDATA[ > 2021-07-19 15:13 from Nurb432   
 >If you have dynamic addresses on servers, you are doing it wrong ( at  
 >least in my book ).   
  
 That's just the way it is, in the cloud, it's unavoidable. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099272362</link><pubDate>Mon, 19 Jul 2021 19:13:23 -0000</pubDate><title>Message #2099272362</title><guid isPermaLink="false">2099272362@Uncensored</guid><description><![CDATA[<html><body>

<p>If you have dynamic addresses on servers, you are doing it wrong ( at least in my book ).</p>
<blockquote>
<div class="message_header"><span>Mon Jul 19 2021 03:06:16 PM EDT</span> <span>from <a href="do_template?template=user_show?who=LoanShark">LoanShark</a> </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY"><br />Among other things, address allocations for individual machines are so dynamic these days that publishing routes at such a fine-grained level can be prohibitive in certain environments. </div>
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099272361</link><pubDate>Mon, 19 Jul 2021 19:06:16 -0000</pubDate><title>Message #2099272361</title><guid isPermaLink="false">2099272361@Uncensored</guid><description><![CDATA[  
 Among other things, address allocations for individual machines are so dynamic
these days that publishing routes at such a fine-grained level can be prohibitive
in certain environments. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099272360</link><pubDate>Mon, 19 Jul 2021 19:04:41 -0000</pubDate><title>Message #2099272360</title><guid isPermaLink="false">2099272360@Uncensored</guid><description><![CDATA[ > 2021-07-19 12:01 from Nurb432   
 >To a vendor, you only allow specific IPs and specific ports.   
 >Running it wide open like that is a HUGE risk. You start with zero  
 >trust and work from there.   
  
 Yeah, OK, I can see that. Just accepting whatever your vendor, under *their*
control, advertises, like 10.0.0.0/8, could be bad. 
  
 But there is a middle ground: specific CIDRs that you define. Amazon VPC
gateways fit this model; you define a CIDR for each of your subnets. There
should be nothing in there that's defined by the vendor. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099272345</link><pubDate>Mon, 19 Jul 2021 16:01:36 -0000</pubDate><title>Message #2099272345</title><guid isPermaLink="false">2099272345@Uncensored</guid><description><![CDATA[<html><body>

<p>To a vendor, you only allow specific IPs and specific ports.  Running it wide open like that is a HUGE risk. You start with zero trust and work from there.</p>
<p> </p>
<p> </p>
<blockquote>
<div class="message_header"><span>Mon Jul 19 2021 11:49:11 AM EDT</span> <span>from <a href="do_template?template=user_show?who=LoanShark">LoanShark</a> </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY"><br />Then what's the point of creating a VPN link to your cloud host if you can't route traffic over it? </div>
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099272344</link><pubDate>Mon, 19 Jul 2021 15:49:11 -0000</pubDate><title>Message #2099272344</title><guid isPermaLink="false">2099272344@Uncensored</guid><description><![CDATA[  
 Then what's the point of creating a VPN link to your cloud host if you can't
route traffic over it? 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099272198</link><pubDate>Sat, 17 Jul 2021 12:14:56 -0000</pubDate><title>Message #2099272198</title><guid isPermaLink="false">2099272198@Uncensored</guid><description><![CDATA[<html><body>

<p> </p>
<p>Office network wend down last night after losing a couple of sites due to weather, this was the reason:</p>
<p> </p>
<div style="box-sizing: border-box; font-family: 'Segoe UI', system-ui, 'Apple Color Emoji', 'Segoe UI Emoji', sans-serif; font-size: 14px;">We found a cloud provider on our site to site VPN firewall that was advertising 10.x.x.x routes back into our network from their cloud instance. One of those routes had precedent over our route that would route AP control packets to the WiFi controller. We added a distribute list to the routing process to prevent the advertisement of RFC 1918 routes back into our network from cloud providers connected via site to site VPN to resolve.</div>
<div style="box-sizing: border-box; font-family: 'Segoe UI', system-ui, 'Apple Color Emoji', 'Segoe UI Emoji', sans-serif; font-size: 14px;"> </div>
<div style="box-sizing: border-box; font-family: 'Segoe UI', system-ui, 'Apple Color Emoji', 'Segoe UI Emoji', sans-serif; font-size: 14px;"> </div>
<div style="box-sizing: border-box; font-family: 'Segoe UI', system-ui, 'Apple Color Emoji', 'Segoe UI Emoji', sans-serif; font-size: 14px;">LoL. </div>
<div style="box-sizing: border-box; font-family: 'Segoe UI', system-ui, 'Apple Color Emoji', 'Segoe UI Emoji', sans-serif; font-size: 14px;"> </div>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099266111</link><pubDate>Mon, 24 May 2021 01:17:58 -0000</pubDate><title>Message #2099266111</title><guid isPermaLink="false">2099266111@Uncensored</guid><description><![CDATA[<html><body>

<p>Wow. That is amazing. I'm going to ask about ALL of my old, obscure, unsupported hardware here on Uncensored before I throw it away. <br /><br />Not being sarcastic - this was excellent info. </p>
<p> </p>
<blockquote>
<div class="message_header"><span>Fri May 21 2021 11:34:37 EDT</span> <span>from <a href="do_template?template=user_show?who=IGnatius T Foobar">IGnatius T Foobar</a> </span></div>
<div class="message_content">
<p>Ah, I see, the 1018 isn't a "real" HP printer, as in it doesn't use any normal HP technology and does not speak PCL.  It is a "Zenographics" printer with its own language.</p>
<p>This particular bastardization of printing appears to be supported by the "foo2zjs" project [ <a href="https://github.com/koenkooi/foo2zjs" target="webcit01">https://github.com/koenkooi/foo2zjs</a> ].   Since foo2zjs gets included along with CUPS in your typical Linux distribution, this probably means that Linux will support that printer for much longer than Windows or Mac.</p>
<br /><br /></div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099265942</link><pubDate>Fri, 21 May 2021 19:41:01 -0000</pubDate><title>Message #2099265942</title><guid isPermaLink="false">2099265942@Uncensored</guid><description><![CDATA[<html><body>

<p>Pretty sure that is the driver set i used. ( i forget now, i just installed 'stuff' and it worked. didnt pay much attention since its all pretty routine, once i found the HP driver would not compile anymore due to my OS version change )</p>
<blockquote>
<div class="message_header"><span>Fri May 21 2021 11:34:37 AM EDT</span> <span>from <a href="do_template?template=user_show?who=IGnatius T Foobar">IGnatius T Foobar</a> </span></div>
<div class="message_content">
<p>Ah, I see, the 1018 isn't a "real" HP printer, as in it doesn't use any normal HP technology and does not speak PCL.  It is a "Zenographics" printer with its own language.</p>
<p>This particular bastardization of printing appears to be supported by the "foo2zjs" project [ <a href="https://github.com/koenkooi/foo2zjs" target="webcit01">https://github.com/koenkooi/foo2zjs</a> ].   Since foo2zjs gets included along with CUPS in your typical Linux distribution, this probably means that Linux will support that printer for much longer than Windows or Mac.</p>
<br /><br /></div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099265918</link><pubDate>Fri, 21 May 2021 15:34:37 -0000</pubDate><title>Message #2099265918</title><guid isPermaLink="false">2099265918@Uncensored</guid><description><![CDATA[<html><body>

<p>Ah, I see, the 1018 isn't a "real" HP printer, as in it doesn't use any normal HP technology and does not speak PCL.  It is a "Zenographics" printer with its own language.</p>
<p>This particular bastardization of printing appears to be supported by the "foo2zjs" project [ https://github.com/koenkooi/foo2zjs ].   Since foo2zjs gets included along with CUPS in your typical Linux distribution, this probably means that Linux will support that printer for much longer than Windows or Mac.</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099265735</link><pubDate>Thu, 20 May 2021 14:22:12 -0000</pubDate><title>Message #2099265735</title><guid isPermaLink="false">2099265735@Uncensored</guid><description><![CDATA[<html><body>

<p>Well i did say its nearly 20 years old :)    And i was wrong on model its a 1018.  </p>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099265714</link><pubDate>Thu, 20 May 2021 13:32:40 -0000</pubDate><title>Message #2099265714</title><guid isPermaLink="false">2099265714@Uncensored</guid><description><![CDATA[<html><body>

<p>Me too. </p>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099265713</link><pubDate>Thu, 20 May 2021 13:25:27 -0000</pubDate><title>Message #2099265713</title><guid isPermaLink="false">2099265713@Uncensored</guid><description><![CDATA[So it's a "winprinter".  I thought those went out of style ages ago. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099265703</link><pubDate>Thu, 20 May 2021 11:36:37 -0000</pubDate><title>Message #2099265703</title><guid isPermaLink="false">2099265703@Uncensored</guid><description><![CDATA[<html><body>

<p>Oh, and i dont blame them for dropping support on a 20 year old printer, i dont expect support forever..  But if they didnt do all that firmware crap, they wouldn't have to.  just support PCL, or Postscript ( showing my age there ) or some other more modern standard and be done.</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099265702</link><pubDate>Thu, 20 May 2021 11:34:37 -0000</pubDate><title>Message #2099265702</title><guid isPermaLink="false">2099265702@Uncensored</guid><description><![CDATA[<html><body>

<p>Ya, my next wont be an HP. After several over the decades.</p>
<p>Used to be one of the best, now they are evil crap. </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099265698</link><pubDate>Thu, 20 May 2021 11:19:12 -0000</pubDate><title>Message #2099265698</title><guid isPermaLink="false">2099265698@Uncensored</guid><description><![CDATA[ > 2021-05-19 19:42 from Nurb432   
 >Right. just mine ( and a few other old 'windows centeric' ones too im  
 >sure )   
 >> Wed May 19 2021 07:20:11 PM EDT from ParanoidDelusions   
 >>  
 >>    
 >>  
 >>Oh. For your printer.    
 >>  
 >>    
  
 Thenn there is the fact you used to be able to print using hplip and only
FOSS components and nowadays they want you tom use their plugin engine (which
is proprietary), yet they cannot get their certificates right so the plugins
are delivered to you unauthenticated. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099265697</link><pubDate>Thu, 20 May 2021 11:16:55 -0000</pubDate><title>Message #2099265697</title><guid isPermaLink="false">2099265697@Uncensored</guid><description><![CDATA[ > 2021-05-19 17:13 from Nurb432     
 >Except HP :)  They dropped support for OSX on this printer, and    
 >stopped updating the Linux driver install er so me moving beyond    
 >Debian v9 blew that too.  My first go around was just to install    
 >their drivers like i did before. but nope. So i went went 'generic'    
 >CUPS and saw that.  But as long as CUPS keeps working i'm ok. just    
 >that message i saw lead me to believe i was screwed here in the near   

 >future.      
 >    
 >I dont print often, mostly mailing labels and perhaps a sewing    
 >template or a recipe, but its nice to be able to do it when i want    
 >and not have to buy a new printer when mine works just fine.     
 >    
 >      
 >    
 >its all about having to download firmware to the printer every time    
 >you print. Stupid design. Stupid idea. Should have been illegal.      
 >    
 >      
  
 
 I used to be a fan of HP printers, but not anymore. This is one of the reasons.
  
  
 HP is in a blacklist in office for new purchases at the time of this writting.
When an HP printer falls appart we buy something else. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099265648</link><pubDate>Wed, 19 May 2021 23:42:37 -0000</pubDate><title>Message #2099265648</title><guid isPermaLink="false">2099265648@Uncensored</guid><description><![CDATA[<html><body>

<p>Right. just mine ( and a few other old 'windows centeric' ones too im sure )</p>
<blockquote>
<div class="message_header"><span>Wed May 19 2021 07:20:11 PM EDT</span> <span>from <a href="do_template?template=user_show?who=ParanoidDelusions">ParanoidDelusions</a> </span></div>
<div class="message_content">
<p>Oh. For your printer. </p>
<p> </p>
<br /><br /></div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099265646</link><pubDate>Wed, 19 May 2021 23:20:11 -0000</pubDate><title>Message #2099265646</title><guid isPermaLink="false">2099265646@Uncensored</guid><description><![CDATA[<html><body>

<p>Oh. For your printer. </p>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099265645</link><pubDate>Wed, 19 May 2021 23:19:53 -0000</pubDate><title>Message #2099265645</title><guid isPermaLink="false">2099265645@Uncensored</guid><description><![CDATA[<html><body>

<p>Really? HP has dropped support for Linux *and* OSX? </p>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099265635</link><pubDate>Wed, 19 May 2021 21:13:24 -0000</pubDate><title>Message #2099265635</title><guid isPermaLink="false">2099265635@Uncensored</guid><description><![CDATA[<html><body>

<p>Except HP :)  They dropped support for OSX on this printer, and stopped updating the Linux driver install er so me moving beyond Debian v9 blew that too.  My first go around was just to install their drivers like i did before. but nope. So i went went 'generic' CUPS and saw that.  But as long as CUPS keeps working i'm ok. just that message i saw lead me to believe i was screwed here in the near future. </p>
<p>I dont print often, mostly mailing labels and perhaps a sewing template or a recipe, but its nice to be able to do it when i want and not have to buy a new printer when mine works just fine.</p>
<p> </p>
<p>its all about having to download firmware to the printer every time you print. Stupid design. Stupid idea. Should have been illegal. </p>
<p> </p>
<blockquote>
<div class="message_header"><span>Wed May 19 2021 03:52:12 PM EDT</span> <span>from <a href="do_template?template=user_show?who=IGnatius T Foobar">IGnatius T Foobar</a> </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY">I'd disregard that unless you're building an operating system of your own. <br />Every Linux comes with not only CUPS but a very rich set of drivers from several different sources, including some contributed by printer manufacturers. </div>
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099265621</link><pubDate>Wed, 19 May 2021 19:52:12 -0000</pubDate><title>Message #2099265621</title><guid isPermaLink="false">2099265621@Uncensored</guid><description><![CDATA[I'd disregard that unless you're building an operating system of your own.
 Every Linux comes with not only CUPS but a very rich set of drivers from
several different sources, including some contributed by printer manufacturers.

]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099265618</link><pubDate>Wed, 19 May 2021 18:52:35 -0000</pubDate><title>Message #2099265618</title><guid isPermaLink="false">2099265618@Uncensored</guid><description><![CDATA[<html><body>

<p>Its an HP, 1212 i think ( or similar at least, I'm too lazy to go look on the back )</p>
<p>About 3 months ago when i reloaded my OS when i switched desktop hardware ( stopped using a NUC and went back to my xeon since i wasn't able to mine ether with it anymore. My 2 video cards were too small as the DAG reached above 4gb - arrgh ), it was time to reload cups too. And during that process CUPS people " we are no longer going to be supporting native drivers soon, you must upgrade to a 'air print' printer" or some such nonsense. The way it was worded sounded like they are actually pulling support for loading native driers in a coming soon version and not just no longer to continue to add more. </p>
<p>I fully support the idea of stopping to add new ones if that is what they want to do, but cutting off what is there and works now, rather dumb. </p>
<blockquote>
<div class="message_header"><span>Wed May 19 2021 02:08:21 PM EDT</span> <span>from <a href="do_template?template=user_show?who=IGnatius T Foobar">IGnatius T Foobar</a> </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY">What kind of printer is it? Something that only has USB? As long as it speaks some version of PCL, CUPS will always be able to support it, probably for far longer than the "official" HP drivers ever will. <br /><br />But even for my quarter-century-old LaserJet 5, I can still get HP drivers for Windoze 10. And I might just go ahead and do that big expensive PostScript upgrade that was megabucks back in the day but probably $10 on eBay now. :) </div>
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099265608</link><pubDate>Wed, 19 May 2021 18:08:21 -0000</pubDate><title>Message #2099265608</title><guid isPermaLink="false">2099265608@Uncensored</guid><description><![CDATA[What kind of printer is it?  Something that only has USB?  As long as it speaks
some version of PCL, CUPS will always be able to support it, probably for
far longer than the "official" HP drivers ever will.  
  
 But even for my quarter-century-old LaserJet 5, I can still get HP drivers
for Windoze 10.   And I might just go ahead and do that big expensive PostScript
upgrade that was megabucks back in the day but probably $10 on eBay now. 
:) 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099265503</link><pubDate>Tue, 18 May 2021 21:28:25 -0000</pubDate><title>Message #2099265503</title><guid isPermaLink="false">2099265503@Uncensored</guid><description><![CDATA[<html><body>

<p>I only recently ( perhaps 10 years ago ) dropped my parallel port printer laser ( i used a jet direct with it to get it on my network. ). And now, HP does not support the new one and i guess CUPS wont either shortly, so soon i wont be able to print unless i replace it...  grumble..  </p>
<blockquote>
<div class="message_header"><span>Tue May 18 2021 02:53:48 PM EDT</span> <span>from <a href="do_template?template=user_show?who=IGnatius T Foobar">IGnatius T Foobar</a> </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY">
<blockquote>Can you save PDF to flash?  Or is that blocked? </blockquote>
<br />Not blocked, but it would certainly be a nuisance. I think most people just print through USB. Or if they have a printer that isn't 25 years old like mine, maybe Bluetooth. I've got a USB-to-parallel adapter, but it only has a three foot cable and the computer is about seven feet away, and I'm too lazy to get an extension. </div>
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099265494</link><pubDate>Tue, 18 May 2021 18:53:48 -0000</pubDate><title>Message #2099265494</title><guid isPermaLink="false">2099265494@Uncensored</guid><description><![CDATA[ >Can you save PDF to flash?  Or is that blocked?   
  
 Not blocked, but it would certainly be a nuisance.  I think most people just
print through USB.  Or if they have a printer that isn't 25 years old like
mine, maybe Bluetooth.  I've got a USB-to-parallel adapter, but it only has
a three foot cable and the computer is about seven feet away, and I'm too
lazy to get an extension.   
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099265493</link><pubDate>Tue, 18 May 2021 18:52:47 -0000</pubDate><title>Message #2099265493</title><guid isPermaLink="false">2099265493@Uncensored</guid><description><![CDATA[<html><body>

<p>Hmm didn't mean for this to be here. sorry. It was work related. the POS software i support at the office.  </p>
<p> </p>
<p> </p>
<blockquote>
<div class="message_header"><span>Tue May 18 2021 11:55:06 AM EDT</span> <span>from <a href="do_template?template=user_show?who=Nurb432">Nurb432</a> </span></div>
<div class="message_content">
<p>Damnit. Re-enabled a feature i turned off a month ago, takes the entire system down. </p>
<p> </p>
<p>WTF POS software</p>
<br /><br /></div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099265468</link><pubDate>Tue, 18 May 2021 15:55:06 -0000</pubDate><title>Message #2099265468</title><guid isPermaLink="false">2099265468@Uncensored</guid><description><![CDATA[<html><body>

<p>Damnit. Re-enabled a feature i turned off a month ago, takes the entire system down. </p>
<p> </p>
<p>WTF POS software</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099265455</link><pubDate>Tue, 18 May 2021 14:25:56 -0000</pubDate><title>Message #2099265455</title><guid isPermaLink="false">2099265455@Uncensored</guid><description><![CDATA[<html><body>

<p>Figuring out how to do brick level backup and restore of Exchange was enough. But of course, they went, "you figured THAT out... and no one else could... why don't you try THIS..." <br /><br />No good deed goes unpunished. </p>
<p> </p>
<blockquote>
<div class="message_header"><span>Tue May 18 2021 08:57:44 EDT</span> <span>from <a href="do_template?template=user_show?who=Nurb432">Nurb432</a> </span></div>
<div class="message_content">
<p>lol</p>
<br /><br /></div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099265442</link><pubDate>Tue, 18 May 2021 12:57:44 -0000</pubDate><title>Message #2099265442</title><guid isPermaLink="false">2099265442@Uncensored</guid><description><![CDATA[<html><body>

<p>lol</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099265409</link><pubDate>Tue, 18 May 2021 02:26:46 -0000</pubDate><title>Message #2099265409</title><guid isPermaLink="false">2099265409@Uncensored</guid><description><![CDATA[<html><body>

<p>Yeah, once I had to start learning GPO... I kinda went, "I think I'm done doing IT administration." </p>
<p> </p>
<blockquote>
<div class="message_header"><span>Mon May 17 2021 11:42:04 EDT</span> <span>from <a href="do_template?template=user_show?who=Nurb432">Nurb432</a> </span></div>
<div class="message_content">
<p>We have an entire team dedicated to it.  And at times, they still struggle. </p>
<br /><br /></div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099265325</link><pubDate>Mon, 17 May 2021 15:42:04 -0000</pubDate><title>Message #2099265325</title><guid isPermaLink="false">2099265325@Uncensored</guid><description><![CDATA[<html><body>

<p>We have an entire team dedicated to it.  And at times, they still struggle. </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099265316</link><pubDate>Mon, 17 May 2021 15:23:20 -0000</pubDate><title>Message #2099265316</title><guid isPermaLink="false">2099265316@Uncensored</guid><description><![CDATA[<html><body>

<p>GPO is brutal. It is super complex to understand and set up... but... it certainly addressed concerns about not being able to lock down Win ADs tightly enough - if someone is willing to learn it. <br /><br /><br /></p>
<blockquote>
<div class="message_header"><span>Mon May 17 2021 06:55:55 EDT</span> <span>from <a href="do_template?template=user_show?who=Nurb432">Nurb432</a> </span></div>
<div class="message_content">
<p>Its not VPN in our case that does it, its a GPO setting that even as local admin i cant undo: Our windows load only lets you use one network adapter at a time. </p>
<p>was sort of a pain when i was moving from home/office once a week. Id switch from wire to WiFi and have to reconfigure my adapters..Later our WiFi at office got good enough i could just use it in both places, but then later after that I had to install a 2nd dedicated WiFi adapter or i was forced to use VPN at work too, as security team at some point decided if you were not logged into one of our boxes ( either windows, or mobile iron ), you only got public WiFi.  So public for my host, and usb WiFi for the windows load.  They used to make exceptions for people like me "just gimme your MAC " but that went away.  i guess it was too much trouble for them to do.  And no mobile-iron for Linux...sooooo</p>
<p> </p>
<blockquote>
<div class="message_header"><span>Mon May 17 2021 01:18:37 AM EDT</span> <span>from <a href="do_template?template=user_show?who=ParanoidDelusions">ParanoidDelusions</a> </span></div>
<div class="message_content">
<p><span style="background-color: transparent;">I mean, technically - if you've got a notebook, and you connect to the VPN over the notebook's ethernet through a DSL connection - but you've got the WiFi hooked up to an internal network... does the VPN shut down the other network? I understand the issue is that you're allowing an outside, insecured network a bridged connection into your internal network through the VPN tunnel if that happens. </span></p>
<blockquote>
<div class="message_content"><br /><br /><br /></div>
</blockquote>
<p> </p>
<br /><br /></div>
</blockquote>
<p> </p>
<br /><br /></div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099265286</link><pubDate>Mon, 17 May 2021 10:55:55 -0000</pubDate><title>Message #2099265286</title><guid isPermaLink="false">2099265286@Uncensored</guid><description><![CDATA[<html><body>

<p>Its not VPN in our case that does it, its a GPO setting that even as local admin i cant undo: Our windows load only lets you use one network adapter at a time. </p>
<p>was sort of a pain when i was moving from home/office once a week. Id switch from wire to WiFi and have to reconfigure my adapters..Later our WiFi at office got good enough i could just use it in both places, but then later after that I had to install a 2nd dedicated WiFi adapter or i was forced to use VPN at work too, as security team at some point decided if you were not logged into one of our boxes ( either windows, or mobile iron ), you only got public WiFi.  So public for my host, and usb WiFi for the windows load.  They used to make exceptions for people like me "just gimme your MAC " but that went away.  i guess it was too much trouble for them to do.  And no mobile-iron for Linux...sooooo</p>
<p> </p>
<blockquote>
<div class="message_header"><span>Mon May 17 2021 01:18:37 AM EDT</span> <span>from <a href="do_template?template=user_show?who=ParanoidDelusions">ParanoidDelusions</a> </span></div>
<div class="message_content">
<p><span style="background-color: transparent;">I mean, technically - if you've got a notebook, and you connect to the VPN over the notebook's ethernet through a DSL connection - but you've got the WiFi hooked up to an internal network... does the VPN shut down the other network? I understand the issue is that you're allowing an outside, insecured network a bridged connection into your internal network through the VPN tunnel if that happens. </span></p>
<blockquote>
<div class="message_content"><br /><br /><br /></div>
</blockquote>
<p> </p>
<br /><br /></div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099265267</link><pubDate>Mon, 17 May 2021 05:18:37 -0000</pubDate><title>Message #2099265267</title><guid isPermaLink="false">2099265267@Uncensored</guid><description><![CDATA[<html><body>

<p>I feel like I used to get around Intel's non-split tunnel to allow me to print while I was connected to the corporate VPN to my local printers. <br /><br />But... maybe not. Maybe I had to drop VPN in order to do that. </p>
<p>I mean, technically - if you've got a notebook, and you connect to the VPN over the notebook's ethernet through a DSL connection - but you've got the WiFi hooked up to an internal network... does the VPN shut down the other network? I understand the issue is that you're allowing an outside, insecured network a bridged connection into your internal network through the VPN tunnel if that happens. <br /><br />Maybe I just e-mailed documents to myself and printed them that way. It was a long time ago - and I remember that *some* of their VPN policies I couldn't get around, and others I didn't want to try, because they were sound policies. </p>
<p> </p>
<blockquote>
<div class="message_header"><span>Sun May 16 2021 14:38:13 EDT</span> <span>from <a href="do_template?template=user_show?who=IGnatius T Foobar">IGnatius T Foobar</a> </span></div>
<div class="message_content">
<p>Correct.  A multihomed host sits on two or more networks.</p>
<p>Our VPN is non-split-tunnel; when you're connected, you can ONLY make connections to the corporate network.  This both sucks and blows if you want to print something and your computer isn't within USB distance of your printer.  I have to print over the Internet back to my home printer, using a port I opened on the firewall to permit print jobs to connect from the address I know the VPN site will go back out on.</p>
<br /><br /></div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099265252</link><pubDate>Mon, 17 May 2021 04:40:48 -0000</pubDate><title>Message #2099265252</title><guid isPermaLink="false">2099265252@Uncensored</guid><description><![CDATA[<html><body>

<p>Where are the HTTP logs? I should probably review those. :D </p>
<p> </p>
<blockquote>
<div class="message_header"><span>Sun May 16 2021 14:23:19 EDT</span> <span>from <a href="do_template?template=user_show?who=IGnatius T Foobar">IGnatius T Foobar</a> </span></div>
<div class="message_content">
<blockquote>
<div class="message_content">
<p>You're too nice. </p>
</div>
</blockquote>
<p>Just lazy.  I could be a lethal digital vigilante if I wanted to spend the time.  I am satisfied enough by offering my sister to every madarchod who calls to sell me an extended warranty on my car or credit card services.</p>
<p>Let 'em make noise at my door.  They won't get in.  There are only a few SSH accounts and they have good passwords.  It's even more fun to watch the HTTP logs.  They're constantly trying every PHP vulnerability in the book.</p>
<br /><br /></div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099265199</link><pubDate>Sun, 16 May 2021 18:55:23 -0000</pubDate><title>Message #2099265199</title><guid isPermaLink="false">2099265199@Uncensored</guid><description><![CDATA[<html><body>

<p>Can you save PDF to flash?  Or is that blocked?</p>
<p>Technically it is here, but i can share a 'folder' to my VM and get around it, if i really needed to. Last time i did that was when i wanted to give my vendor some logs while they were on site, they were too big to email ( several hundred meg ) and they could not get their SFTP running.. And to get an account on ours, is like running for congress with no money.</p>
<p>So i shared it as a folder, not a USB device and poof, copied the stuff over.</p>
<p> </p>
<p>In the past i have had to use my home machine... but the files were huge and they were here for a change and not in the UK.. </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099265194</link><pubDate>Sun, 16 May 2021 18:38:13 -0000</pubDate><title>Message #2099265194</title><guid isPermaLink="false">2099265194@Uncensored</guid><description><![CDATA[<html><body>

<p>Correct.  A multihomed host sits on two or more networks.</p>
<p>Our VPN is non-split-tunnel; when you're connected, you can ONLY make connections to the corporate network.  This both sucks and blows if you want to print something and your computer isn't within USB distance of your printer.  I have to print over the Internet back to my home printer, using a port I opened on the firewall to permit print jobs to connect from the address I know the VPN site will go back out on.</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099265190</link><pubDate>Sun, 16 May 2021 18:23:19 -0000</pubDate><title>Message #2099265190</title><guid isPermaLink="false">2099265190@Uncensored</guid><description><![CDATA[<html><body>

<blockquote>
<div class="message_content">
<p>You're too nice. </p>
</div>
</blockquote>
<p>Just lazy.  I could be a lethal digital vigilante if I wanted to spend the time.  I am satisfied enough by offering my sister to every madarchod who calls to sell me an extended warranty on my car or credit card services.</p>
<p>Let 'em make noise at my door.  They won't get in.  There are only a few SSH accounts and they have good passwords.  It's even more fun to watch the HTTP logs.  They're constantly trying every PHP vulnerability in the book.</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099265112</link><pubDate>Sun, 16 May 2021 03:19:36 -0000</pubDate><title>Message #2099265112</title><guid isPermaLink="false">2099265112@Uncensored</guid><description><![CDATA[We need to prepare... 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099265101</link><pubDate>Sun, 16 May 2021 02:20:22 -0000</pubDate><title>Message #2099265101</title><guid isPermaLink="false">2099265101@Uncensored</guid><description><![CDATA[<html><body>

<p>As a matter of fact, can we get something like this as an opt-in feature with the easy-install? <br /><br />"Proactive Security? Y/N?" </p>
<p> </p>
<blockquote>
<div class="message_header"><span>Sat May 15 2021 22:19:07 EDT</span> <span>from <a href="do_template?template=user_show?who=ParanoidDelusions">ParanoidDelusions</a> </span></div>
<div class="message_content">
<p>"Account Authenticated, the SSH key of the machine you are connecting to does not match the one stored on this machine. Click YES to accept the new SSH key." <br /><br />"Congratulations N00b - you're infected. pWn3d."</p>
<p> </p>
<blockquote>
<div class="message_header"><span>Sat May 15 2021 22:17:39 EDT</span> <span>from <a href="do_template?template=user_show?who=ParanoidDelusions">ParanoidDelusions</a> </span></div>
<div class="message_content">
<p>The thing about randomly knocking on doors is - you never know who might answer. </p>
<p> </p>
<blockquote>
<div class="message_header"><span>Sat May 15 2021 22:16:33 EDT</span> <span>from <a href="do_template?template=user_show?who=ParanoidDelusions">ParanoidDelusions</a> </span></div>
<div class="message_content">
<p><br /><br />You're too nice. </p>
<p> </p>
<blockquote>
<div class="message_header"> </div>
</blockquote>
</div>
</blockquote>
<br /><br /></div>
</blockquote>
<p> </p>
<br /><br /></div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099265100</link><pubDate>Sun, 16 May 2021 02:19:07 -0000</pubDate><title>Message #2099265100</title><guid isPermaLink="false">2099265100@Uncensored</guid><description><![CDATA[<html><body>

<p>"Account Authenticated, the SSH key of the machine you are connecting to does not match the one stored on this machine. Click YES to accept the new SSH key." <br /><br />"Congratulations N00b - you're infected. pWn3d."</p>
<p> </p>
<blockquote>
<div class="message_header"><span>Sat May 15 2021 22:17:39 EDT</span> <span>from <a href="do_template?template=user_show?who=ParanoidDelusions">ParanoidDelusions</a> </span></div>
<div class="message_content">
<p>The thing about randomly knocking on doors is - you never know who might answer. </p>
<p> </p>
<blockquote>
<div class="message_header"><span>Sat May 15 2021 22:16:33 EDT</span> <span>from <a href="do_template?template=user_show?who=ParanoidDelusions">ParanoidDelusions</a> </span></div>
<div class="message_content">
<p><br /><br />You're too nice. </p>
<p> </p>
<blockquote>
<div class="message_header"> </div>
</blockquote>
</div>
</blockquote>
<br /><br /></div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099265099</link><pubDate>Sun, 16 May 2021 02:17:39 -0000</pubDate><title>Message #2099265099</title><guid isPermaLink="false">2099265099@Uncensored</guid><description><![CDATA[<html><body>

<p>The thing about randomly knocking on doors is - you never know who might answer. </p>
<p> </p>
<blockquote>
<div class="message_header"><span>Sat May 15 2021 22:16:33 EDT</span> <span>from <a href="do_template?template=user_show?who=ParanoidDelusions">ParanoidDelusions</a> </span></div>
<div class="message_content">
<p><br /><br />You're too nice. </p>
<p> </p>
<blockquote>
<div class="message_header"> </div>
</blockquote>
</div>
</blockquote>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099265098</link><pubDate>Sun, 16 May 2021 02:16:33 -0000</pubDate><title>Message #2099265098</title><guid isPermaLink="false">2099265098@Uncensored</guid><description><![CDATA[<html><body>

<p>Hell, why not "root/root" with it instantly dumping a *terrible* Windows virus back on them when they connect? I'm sure you could do that. <br /><br />And imagine how many script kiddies you could take out in a day. Leave .txt message on their freshly formatted C: Drive. "Next time, I run your credit until you're 80, asshole." <br /><br />You're too nice. </p>
<p> </p>
<blockquote>
<div class="message_header"><span>Sat May 15 2021 14:26:44 EDT</span> <span>from <a href="do_template?template=user_show?who=IGnatius T Foobar">IGnatius T Foobar</a> </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY"><br />Any port on any address will be scanned, constantly and hard, by black hat scumbags, mostly from China (but occasionally going through proxies elsewhere made out of machines they've taken control of). This is true regardless of what hardware and software you are running. It's just a fact of life right now. <br /><br />There are some tricks I've employed over the years that seem to work pretty well. <br /><br />One is to set up an account with a very obvious username, like "admin" or "oracle" or "guest" or even "root" if you're able to use it, and the password should be the same as the username. The moment that account is authenticated successfully, the system should block the connecting IP address. That slows them down for a while. You might call this a slightly modified honeypot strategy. <br /><br />Another is to slow down the rate at which they are able to establish new SSH connections. For example, the following iptables rules will block an IP address if it attempts more 
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099265050</link><pubDate>Sat, 15 May 2021 18:51:22 -0000</pubDate><title>Message #2099265050</title><guid isPermaLink="false">2099265050@Uncensored</guid><description><![CDATA[<html><body>

<p>Speaking of all this. i think its time for me to setup my guacamole to 2FA, or take it offline to the outside.  Any more its turned off since i work from home now, but that will change eventually.</p>
<p>Unsure how 'safe' openvpn is with keypairs.  I guess safe enough?</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099265044</link><pubDate>Sat, 15 May 2021 18:37:44 -0000</pubDate><title>Message #2099265044</title><guid isPermaLink="false">2099265044@Uncensored</guid><description><![CDATA[<html><body>

<p>Right, but if i split my ports up, then my reverse proxy isn't there to die due to the load. Yes i could find another. but at this point its not worth the trouble.  </p>
<blockquote>
<div class="message_header"><span>Sat May 15 2021 02:26:44 PM EDT</span> <span>from <a href="do_template?template=user_show?who=IGnatius T Foobar">IGnatius T Foobar</a> </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY"><br />Any port on any address will be scanned, constantly and hard, by black hat scumbags, </div>
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099265038</link><pubDate>Sat, 15 May 2021 18:26:44 -0000</pubDate><title>Message #2099265038</title><guid isPermaLink="false">2099265038@Uncensored</guid><description><![CDATA[  
 Any port on any address will be scanned, constantly and hard, by black hat
scumbags, mostly from China (but occasionally going through proxies elsewhere
made out of machines they've taken control of).  This is true regardless of
what hardware and software you are running.  It's just a fact of life right
now. 
  
 There are some tricks I've employed over the years that seem to work pretty
well. 
  
 One is to set up an account with a very obvious username, like "admin" or
"oracle" or "guest" or even "root" if you're able to use it, and the password
should be the same as the username.  The moment that account is authenticated
successfully, the system should block the connecting IP address.  That slows
them down for a while.  You might call this a slightly modified honeypot strategy.

  
 Another is to slow down the rate at which they are able to establish new
SSH connections.  For example,
the following iptables rules will block an IP address if it attempts more
than three connections within 60 seconds: 
  
 /usr/sbin/iptables -I INPUT -p tcp --dport 22 -i eth0 -m state --state NEW
-m recent --set 
 /usr/sbin/iptables -I INPUT -p tcp --dport 22 -i eth0 -m state --state NEW
-m recent  --update --seconds 60 --hitcount 4 -j DROP 
  
 Eventually though, you just learn to live with it. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099264520</link><pubDate>Wed, 12 May 2021 03:40:21 -0000</pubDate><title>Message #2099264520</title><guid isPermaLink="false">2099264520@Uncensored</guid><description><![CDATA[<html><body>

<p>Multihomed usually refers to a device having two  (or more) physical NICs, each on a separate subnet. Sometimes you would use a multi-homed machine to make certain things accessible outside, certain things inside. Other times you would use a second NIC as a heartbeat or maintenance network (for example, running large backups on the second nic isolating that backup traffic from the main network)... <br /><br /> </p>
<blockquote>
<div class="message_header"><span>Tue May 11 2021 20:15:57 EDT</span> <span>from <a href="do_template?template=user_show?who=Nurb432">Nurb432</a> </span></div>
<div class="message_content">
<p> </p>
<p>Perhaps multi homed isn't the correct term, but its what we always called it.</p>
<p> </p>
<p> </p>
<blockquote>
<div class="message_header"><span>Tue May 11 2021 07:53:17 PM EDT</span> <span>from <a href="do_template?template=user_show?who=IGnatius T Foobar">IGnatius T Foobar</a> </span></div>
<div class="message_content">
<p> </p>
<blockquote>
<div class="message_content">
<p>I have copy/paste turned off ..  And our VPN is no longer multi homed, so when its on, its really off my network.</p>
</div>
</blockquote>
<p>By that do you mean that it is not running in a split tunnel configuration?  That's pretty typical these days.  And it's a good idea ... until you need to send something to your network printer at home.</p>
<p> </p>
<br /><br /></div>
</blockquote>
<p> </p>
<br /><br /></div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099264495</link><pubDate>Wed, 12 May 2021 00:15:57 -0000</pubDate><title>Message #2099264495</title><guid isPermaLink="false">2099264495@Uncensored</guid><description><![CDATA[<html><body>

<p>in the old days the routing was split so you still could do things like that.  Back then we also would run it on our personal computers and few of us had laptops.  So anything that didnt need an office IP went out your own line, like messaging, gmail, printing, whatever.   Mostly for work we just would RDP back to our desktops, or a server. They all had the apps we needed, not our home device.</p>
<p>Once that was taken away most everything you would want to do, like check your personal mail, quit due to firewall rules on the office side.  I moved to a minimal VM the next day, dedicated to VPN+RDP.  Tho i did have both laptop and desktop, my laptop at the time was mostly for presentations when i would visit clients it dint have the horsepower to do my real work. That changed 2 or 3 years ago for me, but i still didnt carry it home on a regular basis.</p>
<p>Now its either a shop VM like i do or an actual 2nd device since nearly everyone got a laptop that didnt already have one when we were all sent home last year. Now even people that come into the office, keep their laptop, and are told they must take it home every evening. "just in case of disaster". That was being floated even before the virus forced the issue. We had a flood in a floor below us, took out every desktop  "see you cant rely on RDP".. which i guess is true, when you dont have a VDI infrastructure to handle 1000s of people at once.. </p>
<p>Of course now more ( most ) of our apps are web based, and externally accessable.. not all, but most. A lot has changed over the years. Some dont need anything other than a browser. ( im close, still a couple of fat clients left for me )</p>
<p>Perhaps multi homed isn't the correct term, but its what we always called it.</p>
<p> </p>
<p> </p>
<blockquote>
<div class="message_header"><span>Tue May 11 2021 07:53:17 PM EDT</span> <span>from <a href="do_template?template=user_show?who=IGnatius T Foobar">IGnatius T Foobar</a> </span></div>
<div class="message_content">
<p> </p>
<blockquote>
<div class="message_content">
<p>I have copy/paste turned off ..  And our VPN is no longer multi homed, so when its on, its really off my network.</p>
</div>
</blockquote>
<p>By that do you mean that it is not running in a split tunnel configuration?  That's pretty typical these days.  And it's a good idea ... until you need to send something to your network printer at home.</p>
<p> </p>
<br /><br /></div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099264492</link><pubDate>Tue, 11 May 2021 23:53:17 -0000</pubDate><title>Message #2099264492</title><guid isPermaLink="false">2099264492@Uncensored</guid><description><![CDATA[<html><body>

<p> </p>
<blockquote>
<div class="message_content">
<p>I have copy/paste turned off ..  And our VPN is no longer multi homed, so when its on, its really off my network. </p>
</div>
</blockquote>
<p>By that do you mean that it is not running in a split tunnel configuration?  That's pretty typical these days.  And it's a good idea ... until you need to send something to your network printer at home.</p>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099264412</link><pubDate>Tue, 11 May 2021 13:51:11 -0000</pubDate><title>Message #2099264412</title><guid isPermaLink="false">2099264412@Uncensored</guid><description><![CDATA[<html><body>

<p>I was at a Defcon a few years back and saw a seminar where they were talking about the challenge with port-scanning was that it was really slow on a global scale. It would take forever to go through and scan all open ports on all public IP addresses around the globe. The presenters had developed some new solution that could scan the entire globe in a matter of hours... and they were demonstrating how they were finding back-door portals to things like internal police booking systems that were not password protected - "unpublished" sites that were relying on just having IP addresses instead of URLs for their "security".<br /><br />I can't remember all the details - but I would assume that an increase in volume has come from white-hats doing these kind of scans, but also black-hats getting the technology and using it as well. <br /><br />Combined with increasing numbers of script-kiddies just hammering on any open port on any public address the old fashioned way - it is rush hour on the dogs sniffing your I
<p> </p>
<blockquote>
<div class="message_header"><span>Tue May 11 2021 09:03:21 EDT</span> <span>from <a href="do_template?template=user_show?who=Nurb432">Nurb432</a> </span></div>
<div class="message_content">
<p>fail2ban helps with the script kiddies.</p>
<p> </p>
<p>However, i have run into a problem that i didnt have in the past when i was running tinyproxy.  After a bunch of open connections it sort of gets lost and does not really hard fail, but quits working. Only a reboot fixes it ( not even a service restart ) i upped the limits, and dropped the timeout , but i'm sill getting flooded with connections, and they are not closing their session, so it builds up, fast.  It seems they are from random IPs so fail2ban isn't blocking them first.  I guess things have got worse over the years in the volume of constant attacks ( might also be partly due to me being on a different ISP now with far more bandwidth. I was on Comcast back then, now its a fiber company ). Even before it dies, it starts slowing down due to the hammering. </p>
<p>This most likely was causing the problems i thought i was having before that caused me to look for something else ( ended up with pound ). i was sure it was just me and i had it mis-configured due to poor memory of what i did last time, and then after that thinking citadel wasn't responding. Pretty sure now it was just due to me being hammered to death.</p>
<p>For the time being i shut it down, i may end up having to run on odd ports after its all said and done. Not that its a fix for the attacks, but if i dedicate various ports to each app ( what i was trying to avoid ) at least things will work.</p>
<p> </p>
<p>Frustrating.</p>
<p> </p>
<br /><br /></div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099264405</link><pubDate>Tue, 11 May 2021 13:03:21 -0000</pubDate><title>Message #2099264405</title><guid isPermaLink="false">2099264405@Uncensored</guid><description><![CDATA[<html><body>

<p>fail2ban helps with the script kiddies.</p>
<p> </p>
<p>However, i have run into a problem that i didnt have in the past when i was running tinyproxy.  After a bunch of open connections it sort of gets lost and does not really hard fail, but quits working. Only a reboot fixes it ( not even a service restart ) i upped the limits, and dropped the timeout , but i'm sill getting flooded with connections, and they are not closing their session, so it builds up, fast.  It seems they are from random IPs so fail2ban isn't blocking them first.  I guess things have got worse over the years in the volume of constant attacks ( might also be partly due to me being on a different ISP now with far more bandwidth. I was on Comcast back then, now its a fiber company ). Even before it dies, it starts slowing down due to the hammering. </p>
<p>This most likely was causing the problems i thought i was having before that caused me to look for something else ( ended up with pound ). i was sure it was just me and i had it mis-configured due to poor memory of what i did last time, and then after that thinking citadel wasn't responding. Pretty sure now it was just due to me being hammered to death.</p>
<p>For the time being i shut it down, i may end up having to run on odd ports after its all said and done. Not that its a fix for the attacks, but if i dedicate various ports to each app ( what i was trying to avoid ) at least things will work.</p>
<p> </p>
<p>Frustrating.</p>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099264361</link><pubDate>Tue, 11 May 2021 03:40:32 -0000</pubDate><title>Message #2099264361</title><guid isPermaLink="false">2099264361@Uncensored</guid><description><![CDATA[<html><body>

<p>Ok. That makes sense. I agree with the single point of failure. It seems like a lot of risk, and a lot of effort, just to be able to tell Chinese subnets to go fluck themselves... especially when it won't prevent domestic attacks anyhow. <br /><br />It is so simply built into Synology NAS solutions... it is too bad that Proxmox doesn't have a feature as sophisticated. Fortinet does - and I've got a friend who used to be able to set up blazing Fortinet deals... but - again... more hardware, SPOF... etc... </p>
<p> </p>
<p>I guess I'll just keep letting them hit SSH with root every couple of minutes for as long as I keep the BBS up. </p>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099264204</link><pubDate>Sun, 09 May 2021 14:23:15 -0000</pubDate><title>Message #2099264204</title><guid isPermaLink="false">2099264204@Uncensored</guid><description><![CDATA[<html><body>

<p>So its back to tiny proxy which was actually working. Surprisingly i was right on just needing to setup some upstream settings to fake it into thinking they are upstream proxies.  Problem was citadel was not talking back, so i just assumed it was forgetting something and it was just broke and wasted a lot of time.  So tried it with a couple of other web servers running they all worked.</p>
<p>Got some errors on start on the citadel server too about ports being locked, which makes no sense as i installed *nothing* else. I think ill just start over as i know it worked the past with this setup.</p>
<p>Also need to redo my proxy server, clean it up from the failed attempt with pound. and switch it all over to port 80. </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099264125</link><pubDate>Sat, 08 May 2021 23:31:14 -0000</pubDate><title>Message #2099264125</title><guid isPermaLink="false">2099264125@Uncensored</guid><description><![CDATA[<html><body>

<p>Never mind,  i give up and will try something else.  It looks like the configuration format changed recently and even the man page refers to the old format.</p>
<p>It seemed simple enough with the old config format. But now its changed, and i see zero actual documentation the new way and anything i have tried pisses it off.  So its a hard stop.  Too bad too. </p>
<blockquote>
<div class="message_header"><span>Sat May 08 2021 05:23:25 PM EDT</span> <span>from <a href="do_template?template=user_show?who=Nurb432">Nurb432</a> </span></div>
<div class="message_content">
<p>So anyone used "pound" as a reverse proxy?</p>
<br /><br /></div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099264109</link><pubDate>Sat, 08 May 2021 21:23:25 -0000</pubDate><title>Message #2099264109</title><guid isPermaLink="false">2099264109@Uncensored</guid><description><![CDATA[<html><body>

<p>So anyone used "pound" as a reverse proxy?</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099264093</link><pubDate>Sat, 08 May 2021 18:01:04 -0000</pubDate><title>Message #2099264093</title><guid isPermaLink="false">2099264093@Uncensored</guid><description><![CDATA[<html><body>

<p>"can" but i woudl rather have it on a fat VM.</p>
<p>im still old school and not really ready to accept containers and by the time i have to, it wont matter anymore.  Tho i guess i was an early adopter of the concept of VM back in the 90s, in effect. I realize is the same tech underneath, but same idea at least. On my ST i ran PCDitto and Spectre for mac ( i had access to a dead mac so i was able to get legit roms )</p>
<blockquote>
<div class="message_header"><span>Sat May 08 2021 01:42:58 PM EDT</span> <span>from <a href="do_template?template=user_show?who=IGnatius T Foobar">IGnatius T Foobar</a> </span></div>
<div class="message_content">
<p>You can run the database in a container too, as long as you have a way of keeping its data somewhere other than the container's writable layer.  For example, I maintain a system where a bunch of applications in containers connect to a MariaDB instance running in another container, but that container has /var/lib/mysql mounted as a persistent volume.  I can upgrade the MariaDB container at any time (yes, with an outage) and keep the data.</p>
<p>The clouderati expect you to connect to "their" database-as-a-service, which will have clustering and load balancing.  They probably still run it in containers.</p>
<p> </p>
<br /><br /></div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099264087</link><pubDate>Sat, 08 May 2021 17:42:58 -0000</pubDate><title>Message #2099264087</title><guid isPermaLink="false">2099264087@Uncensored</guid><description><![CDATA[<html><body>

<p>You can run the database in a container too, as long as you have a way of keeping its data somewhere other than the container's writable layer.  For example, I maintain a system where a bunch of applications in containers connect to a MariaDB instance running in another container, but that container has /var/lib/mysql mounted as a persistent volume.  I can upgrade the MariaDB container at any time (yes, with an outage) and keep the data.</p>
<p>The clouderati expect you to connect to "their" database-as-a-service, which will have clustering and load balancing.  They probably still run it in containers.</p>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099264014</link><pubDate>Fri, 07 May 2021 22:47:55 -0000</pubDate><title>Message #2099264014</title><guid isPermaLink="false">2099264014@Uncensored</guid><description><![CDATA[<html><body>

<p>Ya they are good for propping up multiple front ends when you get hammered by customers, but your server(s) doing the work ( db, workflow engine, whatever ) is on a real VM.</p>
<p> </p>
<p>I have never been a fan of them. </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099264007</link><pubDate>Fri, 07 May 2021 21:55:18 -0000</pubDate><title>Message #2099264007</title><guid isPermaLink="false">2099264007@Uncensored</guid><description><![CDATA[<html><body>

<p>It's not really a great idea to think of a container as a lightweight VM.   Containers are not intended to be persistent.  You launch a container with an app in it, you knock it down and launch it somewhere else, or in several places, whatever you want, and you *don't* save your production data in the container's writable layer.</p>
<p>The idea behind a container is that you launch it, it attaches to its data source somewhere, it exposes a service, and then you figure out a way to get connections into that service (such as registering it with a load balancer).   You wouldn't want to run a firewall in this mode.</p>
<p>But yes, nuking China is *always* a good idea.  If you run any service on the Internet, you can count on the Chinese hammering it with brute force attacks 24/7/365.</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099263963</link><pubDate>Fri, 07 May 2021 16:40:42 -0000</pubDate><title>Message #2099263963</title><guid isPermaLink="false">2099263963@Uncensored</guid><description><![CDATA[<html><body>

<p>It also another single point of failure. If you run a host farm with fail over, worst case you move your firewall vm to another host. </p>
<blockquote>
<div class="message_header"><span>Fri May 07 2021 09:23:30 AM EDT</span> <span>from <a href="do_template?template=user_show?who=ParanoidDelusions">ParanoidDelusions</a> </span></div>
<div class="message_content">
<p>Well... adding an entire other full machine increases the footprint of the machines I have to maintain and keep secure - so running an external Firewall moves away from the simplifying I was trying to achieve with virtualizing. <br /><br />It</p>
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099263930</link><pubDate>Fri, 07 May 2021 13:23:30 -0000</pubDate><title>Message #2099263930</title><guid isPermaLink="false">2099263930@Uncensored</guid><description><![CDATA[<html><body>

<p>Well... adding an entire other full machine increases the footprint of the machines I have to maintain and keep secure - so running an external Firewall moves away from the simplifying I was trying to achieve with virtualizing. <br /><br />It becomes a kind of catch-22. I had a dream where I had started a corporate IT job and I was kind of taking stock of the lab equipment in the cube that had been left by the last guy and how I was going to set it up and what it involved... the boss, a button down woman came in and after a few words with her, I realized I was going to have to reconfigure the machines so that the screens would be facing INTO the cube, not out into the walkway between the cubes. Then she gave me two printed memos and the second one wanted me to manage the PR for some new platform or product - and I was already thinking, "Don't you have a PR department to do this kind of shit? Why is it getting sent to IT engineering?" <br /><br />And I think the point here is - I've been doing a lot of p
<p> </p>
<blockquote>
<div class="message_header"><span>Fri May 07 2021 06:58:34 EDT</span> <span>from <a href="do_template?template=user_show?who=Nurb432">Nurb432</a> </span></div>
<div class="message_content">
<p>I think i read somewhere that containers have some network limitations ( someone else was trying the same thing ), but in theory i dont see why it would not work.</p>
<p>I tend to prefer full VMs. But its just a preference. Im still old school. ( go figure )</p>
<br /><br /></div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099263920</link><pubDate>Fri, 07 May 2021 10:58:34 -0000</pubDate><title>Message #2099263920</title><guid isPermaLink="false">2099263920@Uncensored</guid><description><![CDATA[<html><body>

<p>I think i read somewhere that containers have some network limitations ( someone else was trying the same thing ), but in theory i dont see why it would not work.</p>
<p>I tend to prefer full VMs. But its just a preference. Im still old school. ( go figure )</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099263882</link><pubDate>Fri, 07 May 2021 02:44:37 -0000</pubDate><title>Message #2099263882</title><guid isPermaLink="false">2099263882@Uncensored</guid><description><![CDATA[<html><body>

<p>Yeah, I considered that. Could it be set up as a container instead of as a full VM? </p>
<p>I could also pop a hardware firewall in between the Cisco and my network. <br /><br /><br /></p>
<blockquote>
<div class="message_header"><span>Thu May 06 2021 18:20:51 EDT</span> <span>from <a href="do_template?template=user_show?who=Nurb432">Nurb432</a> </span></div>
<div class="message_content">
<p>You could run your firewall/router/etc as a VM. I did that for a bit with pfsense, mostly playing around.  </p>
<p>I guess i sort of do now, as to get into my network from the outside its a VPN connection, from inside a vm. </p>
<blockquote>
<div class="message_header"><span>Thu May 06 2021 06:15:34 PM EDT</span> <span>from <a href="do_template?template=user_show?who=ParanoidDelusions">ParanoidDelusions</a> </span></div>
<div class="message_content">
<p>Synology has a neat firewall that will refuse all traffic from geographic regions... i.e., China, Russia, India... <br /><br />It is a single rule for each country you want to block. It is easy to implement. I'm sure it isn't foolproof, but it is a great option for a SOHO/Personal use model. <br /><br /><br />I wish Proxmox had a feature like this. It looks like with Proxmox, you have to put in entire subnets to block, and this slows down the firewall. <br /><br /><br /><a href="https://forum.proxmox.com/threads/how-to-block-ip-list.37801/" target="webcit01">https://forum.proxmox.com/threads/how-to-block-ip-list.37801/</a><br /><br /><br />I mean, they're not getting anywhere. They're just hitting the SSH port, trying root, failing, and going away. <br /><br /><br />But it fills my logs and makes me want to nuke China. </p>
<p> </p>
<br /><br /></div>
</blockquote>
<p> </p>
<br /><br /></div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099263871</link><pubDate>Thu, 06 May 2021 22:20:51 -0000</pubDate><title>Message #2099263871</title><guid isPermaLink="false">2099263871@Uncensored</guid><description><![CDATA[<html><body>

<p>You could run your firewall/router/etc as a VM. I did that for a bit with pfsense, mostly playing around.  </p>
<p>I guess i sort of do now, as to get into my network from the outside its a VPN connection, from inside a vm. </p>
<blockquote>
<div class="message_header"><span>Thu May 06 2021 06:15:34 PM EDT</span> <span>from <a href="do_template?template=user_show?who=ParanoidDelusions">ParanoidDelusions</a> </span></div>
<div class="message_content">
<p>Synology has a neat firewall that will refuse all traffic from geographic regions... i.e., China, Russia, India... <br /><br />It is a single rule for each country you want to block. It is easy to implement. I'm sure it isn't foolproof, but it is a great option for a SOHO/Personal use model. <br /><br /><br />I wish Proxmox had a feature like this. It looks like with Proxmox, you have to put in entire subnets to block, and this slows down the firewall. <br /><br /><br /><a href="https://forum.proxmox.com/threads/how-to-block-ip-list.37801/" target="webcit01">https://forum.proxmox.com/threads/how-to-block-ip-list.37801/</a><br /><br /><br />I mean, they're not getting anywhere. They're just hitting the SSH port, trying root, failing, and going away. <br /><br /><br />But it fills my logs and makes me want to nuke China. </p>
<p> </p>
<br /><br /></div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099263870</link><pubDate>Thu, 06 May 2021 22:15:34 -0000</pubDate><title>Message #2099263870</title><guid isPermaLink="false">2099263870@Uncensored</guid><description><![CDATA[<html><body>

<p>Synology has a neat firewall that will refuse all traffic from geographic regions... i.e., China, Russia, India... <br /><br />It is a single rule for each country you want to block. It is easy to implement. I'm sure it isn't foolproof, but it is a great option for a SOHO/Personal use model. <br /><br /><br />I wish Proxmox had a feature like this. It looks like with Proxmox, you have to put in entire subnets to block, and this slows down the firewall. <br /><br /><br />https://forum.proxmox.com/threads/how-to-block-ip-list.37801/<br /><br /><br />I mean, they're not getting anywhere. They're just hitting the SSH port, trying root, failing, and going away. <br /><br /><br />But it fills my logs and makes me want to nuke China. </p>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099261066</link><pubDate>Tue, 20 Apr 2021 19:12:48 -0000</pubDate><title>Message #2099261066</title><guid isPermaLink="false">2099261066@Uncensored</guid><description><![CDATA[<html><body>

<p>I have codes.  They dont work anymore but i have codes :P</p>
<blockquote>
<div class="message_header"><span>Tue Apr 20 2021 14:57:31 EDT</span> <span>from <a href="do_template?template=user_show?who=IGnatius T Foobar">IGnatius T Foobar</a> </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY">Thanks but no ... what I really need is nuclear launch codes. There are some pests I need to wave away. </div>
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099261062</link><pubDate>Tue, 20 Apr 2021 18:57:31 -0000</pubDate><title>Message #2099261062</title><guid isPermaLink="false">2099261062@Uncensored</guid><description><![CDATA[Thanks but no ... what I really need is nuclear launch codes.  There are some
pests I need to wave away. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099260528</link><pubDate>Fri, 16 Apr 2021 15:00:57 -0000</pubDate><title>Message #2099260528</title><guid isPermaLink="false">2099260528@Uncensored</guid><description><![CDATA[ > 2021-04-15 13:50 from IGnatius T Foobar   
 >If you have nuclear launch codes, let's talk :)   
 >   
 >  
  
 I have warez, a bunch bunch of PHP applications running for small local businesses,
chat and email, all of it running in a server from the late 2000s because
I am poor. What do ya' think? 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099260523</link><pubDate>Fri, 16 Apr 2021 14:54:14 -0000</pubDate><title>Message #2099260523</title><guid isPermaLink="false">2099260523@Uncensored</guid><description><![CDATA[<html><body>

<p>I love that they compare themselves to the cheap Chinesium knockoffs. <br /><br />"When you're about to unleash total nuclear annihilations on the population, only trust the very best!" </p>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099260486</link><pubDate>Fri, 16 Apr 2021 12:21:36 -0000</pubDate><title>Message #2099260486</title><guid isPermaLink="false">2099260486@Uncensored</guid><description><![CDATA[<html><body>

<p>lol</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099260447</link><pubDate>Fri, 16 Apr 2021 05:09:28 -0000</pubDate><title>Message #2099260447</title><guid isPermaLink="false">2099260447@Uncensored</guid><description><![CDATA[<html><body>

<p>citadel black</p>
<p> </p>
<p><img class="fullscreen" style="margin-top: 10px; margin-left: 132.601px; height: 488px; width: 452.797px;" src="https://images-na.ssl-images-amazon.com/images/I/71Fi1nE6xQL._AC_SL1500_.jpg" alt="" /></p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099260379</link><pubDate>Thu, 15 Apr 2021 18:15:52 -0000</pubDate><title>Message #2099260379</title><guid isPermaLink="false">2099260379@Uncensored</guid><description><![CDATA[<html><body>

<p>Wow, that comment reminded me of this thing:</p>
<p>https://www.theregister.com/2006/07/18/usb_nuclear_war_button_box/</p>
<p>or</p>
<p>https://www.thegreenhead.com/2007/05/big-red-button-doomsday-device-usb-hub.php</p>
<p>My ex-boss got me one for Christmas.  He wanted me to use it when I air-traveled.</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099260365</link><pubDate>Thu, 15 Apr 2021 17:50:39 -0000</pubDate><title>Message #2099260365</title><guid isPermaLink="false">2099260365@Uncensored</guid><description><![CDATA[If you have nuclear launch codes, let's talk :) 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099260315</link><pubDate>Thu, 15 Apr 2021 10:08:45 -0000</pubDate><title>Message #2099260315</title><guid isPermaLink="false">2099260315@Uncensored</guid><description><![CDATA[ > 2021-04-14 09:20 from IGnatius T Foobar     
 >There is such a thing as "lawful intercept".  If the data center     
 >operator receives a warrant for something on your server, they are     
 >typically not permitted to tell the server owner that data or network  
  
 >traffic is being extracted.    
 > This is true regardless of whether your server is "managed" or simply 
   
 >colocated.     
 >      
 > As to whether the employees of the data center would snoop on customer
   
 >servers just for fun -- that is a matter of whether you are using a    

 >reputable hosting company.  At my data centers it is grounds for     
 >termination, and we *will* find out; all access is logged and the     
 >cameras are always rolling.  But if you're using a mom-and-pop hosting 
   
 >company with a 1000sqft data center, then yes, you can expect them to  
  
 >poke around when they're bored.    

 >     
 >    
    
 I don't know how much they are paying you, but it is not nearly enough. If
I were looking for a datacenter in which to host my servers loaded with nuclear
launch codes, I would be calling your firm already :)   
  
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099260231</link><pubDate>Wed, 14 Apr 2021 18:51:22 -0000</pubDate><title>Re: Vlans</title><guid isPermaLink="false">2099260231@Uncensored</guid><description><![CDATA[<html><body>

<p>Thanks for the answer. I am not sure if this is the way I'm going to go, or just figure out a way to multi-home the box with dual NICs - but I want to get started in understanding the differences between either approach. <br /><br />The hardware and experience required to get the VLAN set up seems like a lot for my goals. But, currently, I have more immediate fish to fry - on to the Linux room and more questions... </p>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099260184</link><pubDate>Wed, 14 Apr 2021 15:10:12 -0000</pubDate><title>Re: Vlans</title><guid isPermaLink="false">2099260184@Uncensored</guid><description><![CDATA[That's a great question to be asking if you are getting started with VLANs.

  
 It might help to know that a packet "on the wire" with a VLAN tag has a special
ethertype (0x8100) so it isn't going to be recognizable as any other type
of traffic.  You also need to know whether your Cisco switch ports are configured
as "trunk" or "untagged".  If your switch is VLAN-aware, as nearly all Cisco
switches are, then a trunk port can handle all of your VLANs on the same wire.

  
 To route *between* VLANs, either directly or with some functions added (like
a firewall or NAT), your layer 3 routing device must have interfaces on all
VLANs.  There are two ways to do this: 
  
 1. The old way, which no one does anymore, is to have separate connections
from your switch to your router for every VLAN.  The switch ports are "access
ports" (one VLAN with no tag) and the router ports are not VLAN aware. 

 
 2. The preferred way, is for the switch and router ports to both be running
in "trunk" mode.  Then on your router you have "subinterfaces" which are VLAN
aware.  For example: 
  
 GigabitEthernet1.123 would be on physical port GigabitEthernet1 and operating
on VLAN 123 
 GigabitEthernet1.567 would be on physical port GigabitEthernet1 and operating
on VLAN 567 
  
 Then you might assign 192.168.0.1 to Gi1.123, and 7.5.5.5 to Gi1.567, and
do your routing as usual.  This is referred to as a "one arm" routing device
because it speaks to both (all) networks on the same cable. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099260179</link><pubDate>Wed, 14 Apr 2021 15:00:48 -0000</pubDate><title>Vlans</title><guid isPermaLink="false">2099260179@Uncensored</guid><description><![CDATA[<html><body>

<p>Ok... <br /><br />So, here is the concept I don't understand about a Vlan. <br /><br />Let's say I configure my Cisco switch with a Vlan, so that it is on my public network. 7.5.0.0 and my internal LAN 192.168.0.0</p>
<p> </p>
<p>How does the traffic get through the Cisco back to the actual 192.168.0.0 subnet? <br /><br />I mean - I understand... I think - that on the system, you create two virtual NICs going through one physical NIC, right? That has to be true - and then you assign outgoing traffic to either one or both of those NICs - which must be exposed to software somehow... But then the Cisco has to have a route back to the actual physical subnet. Are you physically connecting the Cisco, in that example then - to the WAN, and also bridging it back to the internal network, with a static route defined on the Cisco to the internal network? <br /><br /><br /></p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099260178</link><pubDate>Wed, 14 Apr 2021 14:50:39 -0000</pubDate><title>Message #2099260178</title><guid isPermaLink="false">2099260178@Uncensored</guid><description><![CDATA[<html><body>

<p>Agreed. Between ineptitude, curiosity, and the potential for the payoff being larger than the penalty... <br /><br />There is also just stumbling across something in your regular work duties. Also... regardless of if everything is logged and cameras are everywhere - assuming your security is bulletproof is always a bad idea. I feel like the highest security places are always the shops with the highest profile leaks. <br /><br /><br /></p>
<blockquote>
<div class="message_header"><span>Wed Apr 14 2021 09:49:27 EDT</span> <span>from <a href="do_template?template=user_show?who=Nurb432">Nurb432</a> </span></div>
<div class="message_content">
<p>"i got the secret to the universe, go ahead and fire me"</p>
<p>Sometimes threat of being terminated is not enough to stop people.  Especially if that is why they are there in the first place.    Its better to assume zero trust. </p>
<blockquote>
<div class="message_header"><span>Wed Apr 14 2021 09:20:19 EDT</span> <span>from <a href="do_template?template=user_show?who=IGnatius T Foobar">IGnatius T Foobar</a> </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY">There is such a thing as "lawful intercept". If the data center operator receives a warrant for something on your server, they are typically not permitted to tell the server owner that data or network traffic is being extracted. <br />This is true regardless of whether your server is "managed" or simply colocated. <br /><br />As to whether the employees of the data center would snoop on customer servers just for fun -- that is a matter of whether you are using a reputable hosting company. At my data centers it is grounds for termination, and we *will* find out; all access is logged and the cameras are always rolling. But if you're using a mom-and-pop hosting company with a 1000sqft data center, then yes, you can expect them to poke around when they're bored.</div>
</div>
</blockquote>
<p> </p>
<br /><br /></div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099260173</link><pubDate>Wed, 14 Apr 2021 13:49:27 -0000</pubDate><title>Message #2099260173</title><guid isPermaLink="false">2099260173@Uncensored</guid><description><![CDATA[<html><body>

<p>"i got the secret to the universe, go ahead and fire me"</p>
<p>Sometimes threat of being terminated is not enough to stop people.  Especially if that is why they are there in the first place.    Its better to assume zero trust. </p>
<blockquote>
<div class="message_header"><span>Wed Apr 14 2021 09:20:19 EDT</span> <span>from <a href="do_template?template=user_show?who=IGnatius T Foobar">IGnatius T Foobar</a> </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY">There is such a thing as "lawful intercept". If the data center operator receives a warrant for something on your server, they are typically not permitted to tell the server owner that data or network traffic is being extracted. <br />This is true regardless of whether your server is "managed" or simply colocated. <br /><br />As to whether the employees of the data center would snoop on customer servers just for fun -- that is a matter of whether you are using a reputable hosting company. At my data centers it is grounds for termination, and we *will* find out; all access is logged and the cameras are always rolling. But if you're using a mom-and-pop hosting company with a 1000sqft data center, then yes, you can expect them to poke around when they're bored. </div>
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099260168</link><pubDate>Wed, 14 Apr 2021 13:20:19 -0000</pubDate><title>Message #2099260168</title><guid isPermaLink="false">2099260168@Uncensored</guid><description><![CDATA[There is such a thing as "lawful intercept".  If the data center operator
receives a warrant for something on your server, they are typically not permitted
to tell the server owner that data or network traffic is being extracted.
 This is true regardless of whether your server is "managed" or simply colocated.

  
 As to whether the employees of the data center would snoop on customer servers
just for fun -- that is a matter of whether you are using a reputable hosting
company.  At my data centers it is grounds for termination, and we *will*
find out; all access is logged and the cameras are always rolling.  But if
you're using a mom-and-pop hosting company with a 1000sqft data center, then
yes, you can expect them to poke around when they're bored. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099260160</link><pubDate>Wed, 14 Apr 2021 12:02:59 -0000</pubDate><title>Message #2099260160</title><guid isPermaLink="false">2099260160@Uncensored</guid><description><![CDATA[<html><body>

<p>It does not mean they WILL, but they CAN.   Always assume the worst with security, its safer.  Depending on the use case, you might be able to mitigate somewhat with encrypted files and such, where you keep the keys, but they still need a certain level of OS access to support the stuff. ( and i dont blame them for that, if its in my network i need some visibility or you are a risk to everyone else )</p>
<p>We have that problem ourselves, so we get the stuff signed off on by all parties so if it does go south and we end up on the evening news, we can at least blame them.</p>
<p> </p>
<blockquote>
<div class="message_header"><span>Wed Apr 14 2021 06:02:18 EDT</span> <span>from <a href="do_template?template=user_show?who=darknetuser">darknetuser</a> </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY">
<blockquote><span style="background-color: transparent; color: navy;">That matches my experience, for things that are managed by an IT team.</span></blockquote>
<br />I was wondering if it would be any different for a dedicated (rented) server the staff is only supposed to look into if something breaks, or a hostedserver that is not the property of the hoster and the staff is not even supposed to look at. <br /><br />I guess it is one of those situations in which going with an external host is fine if you just need the appearance of security ("The data center has signed the data confidentiality papers, so if they mess up and our customers get screwed, we are covered"). However, not great if you need actual security (The server is a key piece in your world domination plan). <br /><br />It sucks, because colocation/hosting is the only affordable way to have some sorts of benefits nowadays. </div>
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099260149</link><pubDate>Wed, 14 Apr 2021 10:02:18 -0000</pubDate><title>Message #2099260149</title><guid isPermaLink="false">2099260149@Uncensored</guid><description><![CDATA[ > 2021-04-13 23:54 from ParanoidDelusions         
 >I was the manager of an IT Hosted solution in Ohio.         
 >        
 >I mean - yeah... when the company sold, the COO saved the document     
  
 >about the sale on her shared drive, with an obvious name - and one of  
     
 >my engineers saw the file - and we all knew what was coming down       

 >before anyone else in the company.         
 >        
 >        
 >That is how IT works. We *do* own Bartertown. I always assume that     
  
 >anything with corporate assets on it has no secrets from the IT        
 >staff. I tell companies if they want me to connect remotely, they're   
    
 >not coming through my private residential network - they need to set   
    
 >me up with a corporate line and notebook that will be completely       

 >isolated from my personal network.         
 >        
        
 That matches my experience,
for things that are managed by an IT team.       
      
 I was wondering if it would be any different for a dedicated (rented) server
the staff is only supposed to look into if something breaks, or a hostedserver
that is not the property of the hoster and the staff is not even supposed
to look at.     
    
 I guess it is one of those situations in which going with an external host
is fine if you just need the appearance of security ("The data center has
signed the data confidentiality papers, so if they mess up and our customers
get screwed, we are covered"). However, not great if you need actual security
(The server is a key piece in your world domination plan).   
  
 It sucks, because colocation/hosting is the only affordable way to have some
sorts of benefits nowadays. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099260123</link><pubDate>Wed, 14 Apr 2021 03:54:01 -0000</pubDate><title>Message #2099260123</title><guid isPermaLink="false">2099260123@Uncensored</guid><description><![CDATA[<html><body>

<p>I was the manager of an IT Hosted solution in Ohio. <br /><br />I mean - yeah... when the company sold, the COO saved the document about the sale on her shared drive, with an obvious name - and one of my engineers saw the file - and we all knew what was coming down before anyone else in the company. <br /><br /><br />That is how IT works. We *do* own Bartertown. I always assume that anything with corporate assets on it has no secrets from the IT staff. I tell companies if they want me to connect remotely, they're not coming through my private residential network - they need to set me up with a corporate line and notebook that will be completely isolated from my personal network. <br /><br /><br /></p>
<blockquote>
<div class="message_header"><span>Tue Apr 13 2021 14:46:13 EDT</span> <span>from <a href="do_template?template=user_show?who=Nurb432">Nurb432</a> </span></div>
<div class="message_content">
<p>Myself, i wouldn't trust a hosted server. They have access to your hardware.  And all the time in the world to screw with it, if they are so inclined. </p>
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099260079</link><pubDate>Tue, 13 Apr 2021 18:46:13 -0000</pubDate><title>Message #2099260079</title><guid isPermaLink="false">2099260079@Uncensored</guid><description><![CDATA[<html><body>

<p>Myself, i wouldn't trust a hosted server. They have access to your hardware.  And all the time in the world to screw with it, if they are so inclined. </p>
<blockquote>
<div class="message_header"><span>Tue Apr 13 2021 14:00:16 EDT</span> <span>from <a href="do_template?template=user_show?who=darknetuser">darknetuser</a> </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY">Subject: Privacy of dedicated servers <br />Hello. <br /><br />I have been wondering how private can dedicated servers, the sort offered by hosting &amp; housing companies, be. By dedicated server, I mean a server offered in rental as part of a hosting &amp; housing plan by a data center. <br /><br />My concern is as follows: let's say I am hosting an important industrial secret in a dedicated server. For example, the formula for turning lentils into viagra). How likely is that a data center tech will compromise that information, either by negligence of by directly looking at what is in the server? Specially when comparing to a server that is yours but you placed in a datacenter under a colocation plan. <br /><br />As far as I understand, dedicated servers get to run monitoring tools planted by the datacenter techs. I have heard some of them missmanage the access credentials very badly. <br /><br /><br />I know there are datacenter pros here. Any ideas or horror tales you'd like to
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099260068</link><pubDate>Tue, 13 Apr 2021 18:00:16 -0000</pubDate><title>Message #2099260068</title><guid isPermaLink="false">2099260068@Uncensored</guid><description><![CDATA[Subject: Privacy of dedicated servers         
 Hello.         
        
 I have been wondering how private can dedicated servers, the sort offered
by hosting & housing companies, be. By dedicated server, I mean a server offered
in rental as part of a hosting & housing plan by a data center.       
      
 My concern is as follows: let's say I am hosting an important industrial
secret in a dedicated server. For example, the formula for turning lentils
into viagra). How likely is that a data center tech will compromise that information,
either by negligence of by directly looking at what is in the server? Specially
when comparing to a server that is yours but you placed in a datacenter under
a colocation plan.     
    
 As far as I understand, dedicated servers get to run monitoring tools planted
by the datacenter techs. I have heard some of them missmanage the access credentials
very badly.
  
  
 I know there are datacenter pros here. Any ideas or horror tales you'd like
to share in this regard? 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099258404</link><pubDate>Mon, 29 Mar 2021 22:50:39 -0000</pubDate><title>Message #2099258404</title><guid isPermaLink="false">2099258404@Uncensored</guid><description><![CDATA[<html><body>

<p>Actually the issue with FTP is that when the client and server exchange messages over the control channel, those messages actually contain the IPv4 addresses on which they are expected to communicate.  The authors of the protocol thought they were being clever and would able to multiplex two or more endpoints over a single control channel.    SIP does the same thing, but it actually has a good reason to do so.</p>
<p>A firewall that implements ALG (Application Level Gateway) for such protocols will insert itself into the data stream of the control channel, strip out those addresses, and replace them with the actual visible address after NAT is applied.  It will also open the correct dynamic ports to allow the connection to complete.</p>
<p>Modern software that needs to build a mesh does not take chances with ALG.  It will establish a UDP connection to a central command-and-control server on the public Internet, which identifies the IP address and UDP port number visible *outside* the client's firewall.  At this point, it knows that anyone can use that address/port to reach the originating application, so it distributes that information to all of the other clients on the mesh.   Now they all know how to reach each other and they can communicate directly without hairpinning through the command and control server.</p>
<p>Usually.  :)    Once in a while you get some network nazi who configures the firewall to only permit return traffic from the remote address to which you originally opened the connection.  You know this has happened because Mario Kart doesn't work and you have to ground-pound your firewall administrator for doing that.</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099258347</link><pubDate>Mon, 29 Mar 2021 12:20:31 -0000</pubDate><title>Message #2099258347</title><guid isPermaLink="false">2099258347@Uncensored</guid><description><![CDATA[ > 2021-03-27 12:32 from IGnatius T Foobar     
 >Weird.  I'm guessing you'll start to see a lot of the problems that    

 >developed with protocols like FTP when NAT44 first came into existence,
   
 >where each end assumes that the IP address it sees at the other end is 
   
 >the real one, and may attempt to establish a multi-port handshake on   
 
 >that basis.     
    
 I am already finding those issues with some services. Which is the reason
why I can offer certain services as ipv4 only   
  
 Also, I think the problem with FTP is not NAT as much as the fact there is
a firewall in the middle of the connection that does not know which ports
to open for data transfers. That issue does not go away just because you remove
NAT (which is another reason why I don't think ipv6 is going to bring true
end-to-end connectivity, since everything is going to be firewalled anyway).

]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=2099258168</link><pubDate>Sat, 27 Mar 2021 16:32:11 -0000</pubDate><title>Message #2099258168</title><guid isPermaLink="false">2099258168@Uncensored</guid><description><![CDATA[Weird.  I'm guessing you'll start to see a lot of the problems that developed
with protocols like FTP when NAT44 first came into existence, where each end
assumes that the IP address it sees at the other end is the real one, and
may attempt to establish a multi-port handshake on that basis. 
  
 The bad side is that no one's going to fix it because there's an assumption
that IPv6 means no NAT. 
  
 The good side is that it probably won't be a big deal for as long as developers
continue to assume that they have to deal with both IPv4+NAT44, IPv6, IPv6+NAT64,
and IPv6+NAT46 connections. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4672076</link><pubDate>Sun, 21 Mar 2021 23:01:38 -0000</pubDate><title>Message #4672076</title><guid isPermaLink="false">4672076@Uncensored</guid><description><![CDATA[ > 2021-03-21 18:31 from IGnatius T Foobar   
 >So would you do NAT66?   
 >   
 >  
  
 I would do NAT66 in order to have logical segmentations within a LAN and
the ISP didn't deign to set propper prefix delegation. Because they would
be giving you not much choice. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4672074</link><pubDate>Sun, 21 Mar 2021 22:31:42 -0000</pubDate><title>Message #4672074</title><guid isPermaLink="false">4672074@Uncensored</guid><description><![CDATA[So would you do NAT66? 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4672057</link><pubDate>Sun, 21 Mar 2021 15:43:18 -0000</pubDate><title>Message #4672057</title><guid isPermaLink="false">4672057@Uncensored</guid><description><![CDATA[<html><body>

<p>Every little bit helps.</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4671998</link><pubDate>Sat, 20 Mar 2021 16:39:37 -0000</pubDate><title>Message #4671998</title><guid isPermaLink="false">4671998@Uncensored</guid><description><![CDATA[ >Right, its not the solution, juts one piece of the puzzle. But ti  
 >does help with *basic* external threats.    
  
 Well then, if security by obscurity is an asset, it's actually a win for
IPv6, because the address space is WAY too large for our non-friends on the
other side of the world to scan the whole range. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4669664</link><pubDate>Sun, 28 Feb 2021 13:54:48 -0000</pubDate><title>Message #4669664</title><guid isPermaLink="false">4669664@Uncensored</guid><description><![CDATA[<html><body>

<p>Right, its not the solution, juts one piece of the puzzle. But ti does help with *basic* external threats. </p>
<p>Of course back during the time period i was talking, it wasn't nearly as 'inadequate' on its own, as it would be now.  Times have changed.</p>
<p> </p>
<blockquote>
<div class="message_header"><span>Sat Feb 27 2021 17:23:57 EST</span> <span>from <a href="do_template?template=user_show?who=IGnatius T Foobar">IGnatius T Foobar</a> </span></div>
<div class="message_content">
<p>Not only that, but the NAT model has a habit of lulling people into a false sense of security.  Simply believing it can't be penetrated because the addresses don't work from the outside ... all of that goes away the moment someone establishes a malicious agent inside the network.</p>
<p>And the bad actor is just as likely to be a program or device you brought home.</p>
<p> </p>
<br /><br /></div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4669622</link><pubDate>Sat, 27 Feb 2021 22:23:57 -0000</pubDate><title>Message #4669622</title><guid isPermaLink="false">4669622@Uncensored</guid><description><![CDATA[<html><body>

<p>Not only that, but the NAT model has a habit of lulling people into a false sense of security.  Simply believing it can't be penetrated because the addresses don't work from the outside ... all of that goes away the moment someone establishes a malicious agent inside the network.</p>
<p>And the bad actor is just as likely to be a program or device you brought home.</p>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4669527</link><pubDate>Fri, 26 Feb 2021 23:02:33 -0000</pubDate><title>Message #4669527</title><guid isPermaLink="false">4669527@Uncensored</guid><description><![CDATA[ >There was no such thing as "hiding" your network topology.  If you had 
 
 >a firewall it performed access control, and *only* access control.    
 >That's the proper way, and IPv6 will bring us back there.   
  
 That's correct. There is no protection that can be achieved with NAT that
cannot also be achieved with an SPI firewall that defaults to "outbound flows
only." You could get into paranoid arguments about leaking information about
the size and shape of your internal network, but none of that sounds like
a high-priority concern to me. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4669480</link><pubDate>Fri, 26 Feb 2021 14:19:35 -0000</pubDate><title>Message #4669480</title><guid isPermaLink="false">4669480@Uncensored</guid><description><![CDATA[<html><body>

<p>Most security isn't the end-all-be-all. <br /><br /><br />I say this all the time - I'd rather be a user on a well secured Windows server than a poorly configured Linux one. The knowledge of the people running the equipment is more important generally than what the equipment is. </p>
<p> </p>
<blockquote>
<div class="message_header"><span>Fri Feb 26 2021 08:43:39 EST</span> <span>from <a href="do_template?template=user_show?who=Nurb432">Nurb432</a> </span></div>
<div class="message_content">
<p>i agree that NAT isn't the end all to be all and just one piece of the puzzle, but i think its a bit more than just obscurity.</p>
<p> </p>
<br /><br /></div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4669471</link><pubDate>Fri, 26 Feb 2021 13:43:39 -0000</pubDate><title>Message #4669471</title><guid isPermaLink="false">4669471@Uncensored</guid><description><![CDATA[<html><body>

<p>i agree that NAT isn't the end all to be all and just one piece of the puzzle, but i think its a bit more than just obscurity.</p>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4669412</link><pubDate>Fri, 26 Feb 2021 05:58:38 -0000</pubDate><title>Message #4669412</title><guid isPermaLink="false">4669412@Uncensored</guid><description><![CDATA[<html><body>

<p>It isn't really security through obscurity. You're not routable - you're not directly reachable, if you're behind NAT.<br /><br />Your router has to direct traffic to you and from you through it. Now granted, that has to happen for you to get outside, and so you can still be *touched*. But you've got a device in the middle that has to forward that traffic to or from you. <br /><br />Unless someone gets inside. Or if there is a backdoor, like a rogue WiFI AP that has weak security. There are vulnerabilities - but NAT does have a built in level of isolation that having a public, routable IP address does not. </p>
<p> <br /><br /><br /></p>
<blockquote>
<div class="message_header"><span>Fri Feb 26 2021 00:37:30 EST</span> <span>from <a href="do_template?template=user_show?who=IGnatius T Foobar">IGnatius T Foobar</a> </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY">
<blockquote>NAT also gives you a bit of protection. </blockquote>
<br />Yes, I get it, and I still am not quite on board with that idea. It's one of those "security through obscurity" things. <br /><br />When I started out in networking, no one was using NAT because IPv4 addresses were plentiful; a mid size corporation could easily acquire a /16 and put a native address on every computer, even the desktops. I think you're a bit older than me so you probably remember it too. There was no such thing as "hiding" your network topology. If you had a firewall it performed access control, and *only* access control. That's the proper way, and IPv6 will bring us back there. <br /><br />It may sound unlikely that home users would be able to implement a proper IPv6 firewall, but it wasn't that long ago that we wouldn't have been able to imagine home users setting up routers at all. The residential-grade devices that currently support IPv6 default to the most typical configuration: DHCPv6 client on the WAN side, DHCPv6 server on the LAN side, and the LAN side /64 prefix being learned 
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4669410</link><pubDate>Fri, 26 Feb 2021 05:37:30 -0000</pubDate><title>Message #4669410</title><guid isPermaLink="false">4669410@Uncensored</guid><description><![CDATA[ >NAT also gives you a bit of protection.   
  
 Yes, I get it, and I still am not quite on board with that idea.  It's one
of those "security through obscurity" things. 
  
 When I started out in networking, no one was using NAT because IPv4 addresses
were plentiful; a mid size corporation could easily acquire a /16 and put
a native address on every computer, even the desktops.  I think you're a bit
older than me so you probably remember it too.  There was no such thing as
"hiding" your network topology.  If you had a firewall it performed access
control, and *only* access control.  That's the proper way, and IPv6 will
bring us back there. 
  
 It may sound unlikely that home users would be able to implement a proper
IPv6 firewall, but it wasn't that long ago that we wouldn't have been able
to imagine home users setting up routers at all.  The residential-grade devices
that currently support
IPv6 default to the most typical configuration: DHCPv6 client on the WAN side,
DHCPv6 server on the LAN side, and the LAN side /64 prefix being learned through
Prefix Delegation. 
  
 It's not perfect, but it's far better than the mess we have now.  We have
outgrown IPv4 and it needs to go away. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4669347</link><pubDate>Thu, 25 Feb 2021 19:19:21 -0000</pubDate><title>Message #4669347</title><guid isPermaLink="false">4669347@Uncensored</guid><description><![CDATA[<html><body>

<p>How many man-hours do you think have been spent rebooting servers and waiting for memory counts, PERC controllers to come up, and system checks to complete, while troubleshooting production downtime issues? <br /><br />I got yelled at in Ohio for having a smoke break during a production downtime. <br /><br />It takes 20 minutes for a machine to do a complete reboot, including shutdown and restart diagnostics. I can sit there and look at a black screen with white text just sitting there counting down numbers for that 20 minutes if you want, or I can go out and have a cigarette and think about the issue. Either way, you're paying me - but the cigarette is probably going to help me fix your problem faster. </p>
<p> </p>
<blockquote>
<div class="message_header"><span>Wed Feb 24 2021 19:42:47 EST</span> <span>from <a href="do_template?template=user_show?who=Nurb432">Nurb432</a> </span></div>
<div class="message_content">
<p><span style="background-color: transparent;">  I wonder how much time over the decades i have sat and waited while i loaded machines, from stacks of floppies, to CDs/DVDs, then to network images ( ghost, and later clonezilla ) and RIS type automated services via network boot. </span></p>
<p> </p>
<p> </p>
<blockquote>
<div class="message_header"><span>Tue Feb 23 2021 13:15:10 EST</span> <span>from <a href="do_template?template=user_show?who=IGnatius T Foobar">IGnatius T Foobar</a> </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY"> </div>
</div>
</blockquote>
</div>
</blockquote>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4669281</link><pubDate>Thu, 25 Feb 2021 14:10:13 -0000</pubDate><title>Message #4669281</title><guid isPermaLink="false">4669281@Uncensored</guid><description><![CDATA[<html><body>

<p>Home users better do it too, or we cant even imagine the havoc that it will create as every commodity IoT device on the planet gets infected.. </p>
<blockquote>
<div class="message_header"><span>Thu Feb 25 2021 04:51:15 EST</span> <span>from <a href="do_template?template=user_show?who=darknetuser">darknetuser</a> </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY"><br />I was thinking, ipv6 is only going to give you the illusion of end-to-end connectivity, since any corporate sysadmin is going to put his network behind a firewall, so the devices will have Internet routable addresses, but won't be reachable from the outside unless then administrator adds a rule for such effect. <br /><br />Pretty much like we have with ipv4 in big deployments. And in small deployments it makes no difference since either. </div>
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4669270</link><pubDate>Thu, 25 Feb 2021 09:51:15 -0000</pubDate><title>Message #4669270</title><guid isPermaLink="false">4669270@Uncensored</guid><description><![CDATA[   
 I was thinking, ipv6 is only going to give you the illusion of end-to-end
connectivity, since any corporate sysadmin is going to put his network behind
a firewall, so the devices will have Internet routable addresses, but won't
be reachable from the outside unless then administrator adds a rule for such
effect.   
  
 Pretty much like we have with ipv4 in big deployments. And in small deployments
it makes no difference since either. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4669262</link><pubDate>Thu, 25 Feb 2021 00:42:47 -0000</pubDate><title>Message #4669262</title><guid isPermaLink="false">4669262@Uncensored</guid><description><![CDATA[<html><body>

<p>NAT also gives you a bit of protection.</p>
<p>One place i worked, wont mention the name this time, had one of the first class As given out. They gave those addresses out to all their workstations AND servers across the entire corporation ( world wide ). And were route-able, *from* the outside...   Once i got there i started waving a red flag "we cant do this just because you can" but was ignored. This was around 92ish so it was windows 3.x and OS/2 days. </p>
<p>They also wrote their own anti-virus software up at corporate.  I was one of the test subjects to test for regression. i had a box of floppies with various infections.  A RED box, with a lock.  and a dedicated machine, off network ( i removed the network card and taped the thing shut ) to test with.</p>
<p>They were ahead of the curve on workstation and server builds, had their own system where you boot off floppy, choose the machine type, and away it went. That was nice, and a bit ahead of their time. Saved me countess hours of floppies..   I wonder how much time over the decades i have sat and waited while i loaded machines, from stacks of floppies, to CDs/DVDs, then to network images ( ghost, and later clonezilla ) and RIS type automated services via network boot. </p>
<p> </p>
<p> </p>
<blockquote>
<div class="message_header"><span>Tue Feb 23 2021 13:15:10 EST</span> <span>from <a href="do_template?template=user_show?who=IGnatius T Foobar">IGnatius T Foobar</a> </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY">Those aren't problems with IPv6. They're anticipated issues with deployment strategy. Numbering on your internal network is a good example, because that is *exactly* how it originally was with IPv4. You bought service from a provider, and they gave you a block of addresses to use. NAT created the illusion that you could have a permanent addressing scheme using addresses that didn't belong to you. <br /><br />Personally I believe that mid to large scale IPv6 deployments will end up looking more like IPX than like IPv4. IPX got it right -- you derived an address from the router announcement and your MAC address (which is *exactly* what SLAAC does) and then you announced yourself into the name service. The problem, of course, is that SLAAC only provides network discovery and not service discovery, but that has been addressed in RFC 8106 so maybe that's solved too. </div>
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4669102</link><pubDate>Tue, 23 Feb 2021 18:15:10 -0000</pubDate><title>Message #4669102</title><guid isPermaLink="false">4669102@Uncensored</guid><description><![CDATA[Those aren't problems with IPv6.  They're anticipated issues with deployment
strategy.  Numbering on your internal network is a good example, because that
is *exactly* how it originally was with IPv4.  You bought service from a provider,
and they gave you a block of addresses to use.  NAT created the illusion that
you could have a permanent addressing scheme using addresses that didn't belong
to you. 
  
 Personally I believe that mid to large scale IPv6 deployments will end up
looking more like IPX than like IPv4.  IPX got it right -- you derived an
address from the router announcement and your MAC address (which is *exactly*
what SLAAC does) and then you announced yourself into the name service.  The
problem, of course, is that SLAAC only provides network discovery and not
service discovery, but that has been addressed in RFC 8106 so maybe that's
solved too. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4653708</link><pubDate>Sun, 21 Feb 2021 15:23:55 -0000</pubDate><title>Message #4653708</title><guid isPermaLink="false">4653708@Uncensored</guid><description><![CDATA[ > This is the way IP was meant to be.  With IPv6 there is no NAT and I  
      
 >see it happening.  And it's *wonderful*.         
 >         
 >        
        
 DO you mean that IP was intended to let your ISP decide how you assign subnetworks
in your home LAN? Because that is precisely what you get in ipv6. If your
ISP does not set proper prefix delegation and you wanto to segment your network,
you are back to NAT boxes and application firewalls, with the inconvenience
that many ipv6 applications don t work with those (as opposed to ipv4 applications
that do).       
      
 Slaac is a half assed solution for configuring LANs by the way. It was designed
to configure your network but it is uncapable of transfering the information
you need for a serious one, so you end up pulling good old DHCP anyway for
that. Total bummer.     
    
 Then we have the mess of temporary ipv6 addresses,
privacy extensions, and the RFCs for ipv6 firewalls suck cocks. You have to
let a lot of traffic through in order to certain ipv6 functions to work at
all, but this it not self-evident.   
  
 tl;dr I like what ipv6 tries to do, but in the long run it is gonna suck
suck suck suck. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4651102</link><pubDate>Sun, 21 Feb 2021 03:51:09 -0000</pubDate><title>Message #4651102</title><guid isPermaLink="false">4651102@Uncensored</guid><description><![CDATA[  
 (continued) 
  
 One of the private IPv4 networks I experimented with was my home network,
which is IPv4 only because Verizon still hasn't upgraded my town to dual stack.
 I attached it to my gateway using a Wireguard VPN, and mapped a /96 block
to it. 
  
 Then I went to a *distant* part of my IPv6 network, and started connecting
to individual hosts in my home.  Everything just works.  I didn't have to
worry about address boundaries, I didn't have to worry about conflicting address
namespaces, everything is just reachable, no problem at all. 
  
 And that, my friends, is what IP was supposed to be all about in the first
place.  You don't realize how much time is wasted on the effort required to
hop from network to network, until you don't have to do it anymore.  For those
not already aware -- you don't use NAT with IPv6.  When a host has an address
on an IPv6 network, that address is
globally unique. 
  
 That means if you know the address of a host, anywhere in the world, and
the firewall rules permit access, you can get to it.  And it might take a
bit before you realize how mind-bogglingly useful that is. 
  
 Think about your average "thing" on a private network.  You want to be able
to get to that "thing" from anywhere in the world.  What do you have to do?
 Well if you're on a corporate network, your network administrator has to
set up a NAT mapping, maybe create some firewall policies, etc.  And if you're
on a home network, good luck getting that to work because the chances are
99.9% that you're not someone who knows networking, so the manufacturer of
the "thing" has probably set up some "cloud service" to act as a connection
broker. 
  
 But on IPv6?  Once you know the address, that address is valid world wide.
 You can learn the address while you're on the home
network and then it will be valid somewhere else.  Yes, you still have to
deal with the firewall; there are a bunch of ways to handle that.  One might
be to simply use UDP, since there's no longer any such thing as "I know my
port number, but I don't know what the firewall changed it to".  Multiplayer
games use this method, but since they're on NAT44 they need help from a central
connection broker to help set up the mesh.  Not so with IPv6. 
  
 This is the way IP was meant to be.  With IPv6 there is no NAT and I see
it happening.  And it's *wonderful*. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4651101</link><pubDate>Sun, 21 Feb 2021 03:17:42 -0000</pubDate><title>Message #4651101</title><guid isPermaLink="false">4651101@Uncensored</guid><description><![CDATA[  
 Lately I've been doing a lot with IPv6.  And it leads me to believe that
IPv6 is awesome, and dammit, I want IPv6 everywhere and I want it NOW. 
  
 I am using a module called "jool" [http://jool.mx] which is an absolutely
fantastic NAT64 gateway for Linux.  It can map a /96 IPv6 block to an entire
IPv4 network, so you only have to set it up once.  For example, if you know
that you've mapped dead:beef::/96 to an IPv4 network, and you know that there's
a host on that network at 192.168.0.100, then you can reach it at dead:beef::c0a8:0064
(which, you might not know, can actually be written as dead:beef::192.168.0.100,
and your operating system *will* understand that). 
  
 From the IPv4 network's point of view, all traffic appears to originate from
the gateway, just like when you access the IPv4 Internet from behind your
home router, all traffic appears to originate from the outside address
of the router.  And just like that home router, you can map individual ports
in the other direction.  So if you have a service on the IPv6 network that
needs to be reachable from IPv4, you map that service's port, and they connect
to it on the gateway, which forwards the connection along to the origin server
(again, with the correctly mapped address). 
  
 But it gets more fun than that.  I mapped a bunch of *different* private
IPv4 networks, most of which have overlapping addresses, each to its own /96
block.  (And I did it on the same Linux machine by using namespaces, but that's
a different topic altogether.)   From my point of view on the IPv6 network,
the whole thing looks like ONE BIG NETWORK.  It is just so amazingly cool.
 No "jump boxes", no application gateways, no 1:1 static NAT44 mappings. 
You map it once and you're done.  I can access any address on any IPv4 network
as if they
were native IPv6. 
  
 In the next message I will wax eloquent over some of the reasons this is
so cool. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4650217</link><pubDate>Fri, 12 Feb 2021 18:46:29 -0000</pubDate><title>Message #4650217</title><guid isPermaLink="false">4650217@Uncensored</guid><description><![CDATA[<html><body>

<p>Lol, just talked to my brother 5 minutes ago and he wants me to that it at his house for some new security cams hes wanting to install, doesn't want wireless. </p>
<blockquote>
<div class="message_header"><span>Fri Feb 12 2021 09:13:17 EST</span> <span>from <a href="do_template?template=user_show?who=IGnatius T Foobar">IGnatius T Foobar</a> </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY">Ok then ... powerline networking? :) Anything but wireless </div>
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4650215</link><pubDate>Fri, 12 Feb 2021 18:38:10 -0000</pubDate><title>Message #4650215</title><guid isPermaLink="false">4650215@Uncensored</guid><description><![CDATA[<html><body>

<p>Heh</p>
<blockquote>
<div class="message_header"><span>Fri Feb 12 2021 09:13:17 EST</span> <span>from <a href="do_template?template=user_show?who=IGnatius T Foobar">IGnatius T Foobar</a> </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY">Ok then ... powerline networking? :) Anything but wireless </div>
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4650189</link><pubDate>Fri, 12 Feb 2021 14:13:17 -0000</pubDate><title>Message #4650189</title><guid isPermaLink="false">4650189@Uncensored</guid><description><![CDATA[Ok then ... powerline networking?  :)    Anything but wireless 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4649767</link><pubDate>Mon, 08 Feb 2021 13:18:02 -0000</pubDate><title>Message #4649767</title><guid isPermaLink="false">4649767@Uncensored</guid><description><![CDATA[<html><body>

<p>Forgot to mention, if i did run wire up there, id tie a string to my belt, and crawl with that, not try to lug the wires during the entry.  Then just pull the string and the wires on the other end.</p>
<p>My brother used to run cable for a living and often had no help ( houses, businesses, etc ).  He 'borrowed' one of my RC cars, and a pistol crossbow.   </p>
<p> </p>
<p>Back when i did that i always had help, which reminds me of the time I re-did an office and was going to mange their hardware too. "i want all this old stuff out of here, we are going VoIP" "are you sure, we can leave it for the future and run our lines beside it, well ok, its gone then". Next day "where are my phone lines, i'm not going to pay you for the work"..    wtf.  "fine, we pull our stuff back out, including the patch panel, switch and server, and we dont want your business.  </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4649764</link><pubDate>Mon, 08 Feb 2021 12:08:04 -0000</pubDate><title>Message #4649764</title><guid isPermaLink="false">4649764@Uncensored</guid><description><![CDATA[<html><body>

<p>I thought about that, but the cable that goes to the back is fried ( old left over stuff from Comcast ). The coax that is intact, only goes to the roof ( OTA antenna ) so i have to run something, no matter what i do at this point.</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4649737</link><pubDate>Sun, 07 Feb 2021 23:42:41 -0000</pubDate><title>Re: WiFi Bridge</title><guid isPermaLink="false">4649737@Uncensored</guid><description><![CDATA[ >I have considered running some shielded cat5 outside and around the  
 >side of the house, same path/hole that the old coax is in, or even  
 >over the stupid roof .. paint it grey and no one will even notice.  
  
  
 That is unfortunate.  I have a low truss roof as well, and even without any
ductwork blocking the way, it was a gigantic effort to spelunk to the other
side, dragging a piece of Cat5E and a piece of RG6 along with me. 
  
 If you have leftover coaxial cable in the house from when it had cable tv,
you could also use a pair of MoCA bridges ... but if the coax goes outside
then you might as well just run ethernet alongside it.  Or maybe a few strands
of single-mode fiber to make it truly future proof :) 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4649690</link><pubDate>Sun, 07 Feb 2021 16:29:27 -0000</pubDate><title>Re: WiFi Bridge</title><guid isPermaLink="false">4649690@Uncensored</guid><description><![CDATA[<html><body>

<p>Yup.</p>
<p>Or it could be use for a single device too of course.  </p>
<blockquote>
<div class="message_header"><span>Sun Feb 07 2021 11:09:23 EST</span> <span>from <a href="do_template?template=user_show?who=ParanoidDelusions">ParanoidDelusions</a> </span> <span class="message_subject">Subject: Re: WiFi Bridge</span></div>
<div class="message_content">
<p>Ok... so I am understanding what this does right then? It is basically a modern version of what I have - except you have to uplink it to your own switch for it to bridge multiple ethernet devices to your WiFi?</p>
<p> </p>
<blockquote>
<div class="message_header"> </div>
</blockquote>
</div>
</blockquote>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4649682</link><pubDate>Sun, 07 Feb 2021 16:09:23 -0000</pubDate><title>Re: WiFi Bridge</title><guid isPermaLink="false">4649682@Uncensored</guid><description><![CDATA[<html><body>

<p>Ok... so I am understanding what this does right then? It is basically a modern version of what I have - except you have to uplink it to your own switch for it to bridge multiple ethernet devices to your WiFi?</p>
<p> </p>
<blockquote>
<div class="message_header"><span>Sun Feb 07 2021 10:06:09 EST</span> <span>from <a href="do_template?template=user_show?who=Nurb432">Nurb432</a> </span> <span class="message_subject">Subject: Re: WiFi Bridge</span></div>
<div class="message_content">
<p>Yes having a built in switch would take this to the next level, even tho its is only 100mb ( more than i need for my use case ). But, i just Velcroed it to the top of a small 5 port switch.    Tested with a netgear 20 port i had in the closet, but i had forgot how noisy those fans were.  So back in the closet it went.</p>
<p> </p>
</div>
</blockquote>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4649664</link><pubDate>Sun, 07 Feb 2021 15:06:09 -0000</pubDate><title>Re: WiFi Bridge</title><guid isPermaLink="false">4649664@Uncensored</guid><description><![CDATA[<html><body>

<p>Yes having a built in switch would take this to the next level, even tho its is only 100mb ( more than i need for my use case ). But, i just Velcroed it to the top of a small 5 port switch.    Tested with a netgear 20 port i had in the closet, but i had forgot how noisy those fans were.  So back in the closet it went.</p>
<p>May get another, and ditch the AC/Ethernet extender thingie i have out in the garage for my crypto miners. ( or not.. they dont need much bandwidth i guess. no real need to spend the $ )</p>
<p>The only real issue other than nearly zero documentation i ran into is it really needs higher amp power supply.  The pc i had planned on using for power, wast quite enough. It sort of 1/2 way worked. really frustrating until i figured it out was a power thing.  I had set it up. got ti working, moved it, toast. Rinse repeat a couple of times. </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4649656</link><pubDate>Sun, 07 Feb 2021 14:36:15 -0000</pubDate><title>Re: WiFi Bridge</title><guid isPermaLink="false">4649656@Uncensored</guid><description><![CDATA[<html><body>

<p>I have one of these - I love it. I have it in my gaming room and I use it to get my Amigas and my C128 and other old devices with Ethernet onto my WiFI. It has 4 Cat5 ports and bridges them to a WiFi signal. It is old, doesn't support 2ghz/5ghz or modern encryption, and I have never found anything like it made since. I go through some hoops to get it to bridge to my actual network. Basically, I have a Wifi router in the middle that this bridges to, that then hooks into the wired network in my office. <br /><br />It isn't very elegant, but it works. <br /><br />https://www.newegg.com/buffalo-wli-tx4-g54hp-ethernet-port/p/N82E16833162168</p>
<p> </p>
<p> </p>
<blockquote>
<div class="message_header"><span>Fri Feb 05 2021 18:07:36 EST</span> <span>from <a href="do_template?template=user_show?who=Nurb432">Nurb432</a> </span> <span class="message_subject">Subject: WiFi Bridge</span></div>
<div class="message_content">
<p>I know its an older topic, but picked up one of these things this week.  It actually lets you bridge more than on machine on its Ethernet onto your WiFi network. Same subnet.  A bit fussy to setup, but after i got it right, works like a charm. Lot easier than fussing with other solutions i have tried. </p>
<p>Have it hooked to a switch in my computer room with 3 machines on it, all getting the same subnet that the WiFi is on.  But since its a switch i get higher rate in the room between machines than i did with everything on WiFi. ( since it never has to traverse the WiFi to the other side of the house now ). </p>
<p>Servers are still on the other switch, attached directly to the incoming fiber.  </p>
<p> </p>
<p> </p>
<p><a href="https://www.amazon.com/gp/product/B07KHV4SCX/ref=ppx_yo_dt_b_asin_title_o00_s01?ie=UTF8&amp;psc=1" target="webcit01">https://www.amazon.com/gp/product/B07KHV4SCX/ref=ppx_yo_dt_b_asin_title_o00_s01?ie=UTF8&amp;psc=1</a></p>
<br /><br /></div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4649654</link><pubDate>Sun, 07 Feb 2021 14:33:25 -0000</pubDate><title>Re: WiFi Bridge</title><guid isPermaLink="false">4649654@Uncensored</guid><description><![CDATA[<html><body>

<p>Yes in effect. Sure other ways to do it, but first one i found that is a true bridge, without a lot of messing around.</p>
<p> </p>
<p>Running wire in my house... Short version:</p>
<p> </p>
<p>I have truss roof instead of rafters. so there is about a 1.5x1.5 tunnel down the middle of the house.   Doable with a lot of effort.  However...   Picture a long rectangle of a house.  One end is the garage and entry point   2/3 down the house ( lets say east ) is the room it needs to go, and where the router is. The rooms are on north and south. Hallway down middle.  sounds simple so far, get some sheet wood and use it to crawl back there, using some string, and some poles to get it across then back down.</p>
<p>Problem is 1/2 way back is the air intake and it teaks up ALL the crawl way at that point.  No way around it short of removing it. So no easy way past it. Next to it is the chimney.. so a big blob of duct work in the way. I could i cut out a 2nd attic door at the 2/3 waypoint ( not really fond of doing it , but i have considered it, nothing else more storage area to use.  )</p>
<p>I had the roof off perhaps 12 years ago, and didnt even think of it at the time.  Perfect chance. But at the time i had coax coming in the front of the house. so it all terminated in the 'south' computer room and i never really thought about it. Now that i went fiber, it terminates in the 'north' room.</p>
<p>Oh, and the 'north' room is isolated from the house. no door inside or anything. ( house was oil when it was built back in the 50s, i think it was code to keep it 'outside'. ) I plan on tearing out the wall and opening it up to the adjacent utility room, but have not got around to it.  And it wouldn't solve the problem of attic access anyway, just make our utility room bigger and not have to go outside to get to the water heater. That burnt me once, it had fallen over, about bunt the house down.. I woudl check every week, but during that week it fell apart. Flooded the house.    Succy way to wake up in the morning.  Few years later thermostat suck 'on' heated up and the pressure valve blew.. and another freaking leak.   Now have water sensors out there, and going tank-less this spring.  </p>
<p> </p>
<p>I have considered running some shielded cat5 outside and around the side of the house, same path/hole that the old coax is in, or even over the stupid roof .. paint it grey and no one will even notice. Just look like coax for tv. </p>
<p> </p>
<p> </p>
<p> </p>
<blockquote>
<div class="message_header"><span>Sat Feb 06 2021 18:36:44 EST</span> <span>from <a href="do_template?template=user_show?who=IGnatius T Foobar">IGnatius T Foobar</a> </span> <span class="message_subject">Subject: Re: WiFi Bridge</span></div>
<div class="message_content">
<p>So it's basically an access point in reverse?  I can think of a few applications for that.  Most of them involve mooching someone else's Internet and then fanning out to a proper LAN.  But you're using it in your own home.  I wish I could come over there and help you run cable.</p>
<br /><br /></div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4649597</link><pubDate>Sat, 06 Feb 2021 23:36:44 -0000</pubDate><title>Re: WiFi Bridge</title><guid isPermaLink="false">4649597@Uncensored</guid><description><![CDATA[<html><body>

<p>So it's basically an access point in reverse?  I can think of a few applications for that.  Most of them involve mooching someone else's Internet and then fanning out to a proper LAN.  But you're using it in your own home.  I wish I could come over there and help you run cable.</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4649498</link><pubDate>Fri, 05 Feb 2021 23:07:36 -0000</pubDate><title>WiFi Bridge</title><guid isPermaLink="false">4649498@Uncensored</guid><description><![CDATA[<html><body>

<p>I know its an older topic, but picked up one of these things this week.  It actually lets you bridge more than on machine on its Ethernet onto your WiFi network. Same subnet.  A bit fussy to setup, but after i got it right, works like a charm. Lot easier than fussing with other solutions i have tried. </p>
<p>Have it hooked to a switch in my computer room with 3 machines on it, all getting the same subnet that the WiFi is on.  But since its a switch i get higher rate in the room between machines than i did with everything on WiFi. ( since it never has to traverse the WiFi to the other side of the house now ). </p>
<p>Servers are still on the other switch, attached directly to the incoming fiber.  </p>
<p> </p>
<p> </p>
<p>https://www.amazon.com/gp/product/B07KHV4SCX/ref=ppx_yo_dt_b_asin_title_o00_s01?ie=UTF8&amp;psc=1</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4638702</link><pubDate>Sun, 27 Dec 2020 23:55:17 -0000</pubDate><title>Message #4638702</title><guid isPermaLink="false">4638702@Uncensored</guid><description><![CDATA[<html><body>

<p>It was partly me - but things have gotten sorted and seem to be running fairly stable. I'm loath to Eff with anything at this point. </p>
<p> </p>
<blockquote>
<div class="message_header"><span>Sat Dec 26 2020 14:35:26 EST</span> <span>from <a href="do_template?template=user_show?who=Nurb432">Nurb432</a> </span></div>
<div class="message_content">
<p>it wasn't just you. </p>
<blockquote>
<div class="message_header"><span>Mon Nov 23 2020 21:39:23 EST</span> <span>from <a href="do_template?template=user_show?who=ParanoidDelusions">ParanoidDelusions</a> </span></div>
<div class="message_content">
<p>My site is suddenly running dog slow over the public ACE network. Telnet is working, but the webcit interface is very unresponsive. <br /><br />I thought it might be the Pi heating up, and so rebooted it, but the issue persisted. <br /><br />Then I connected directly - and that works fine. <br /><br />I am getting buffering and quality adjustments watching video over my regular ISP gateway too - which is unusual.<br /><br />I've noticed it happen a couple of times today here at Uncensored, too. <br /><br />Wonder if it is an Internet wide thing, something going on with my local ISP, or something going on with ACE specifically. </p>
<p> </p>
<br /><br /></div>
</blockquote>
<p> </p>
<br /><br /></div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4638154</link><pubDate>Sat, 26 Dec 2020 19:35:26 -0000</pubDate><title>Message #4638154</title><guid isPermaLink="false">4638154@Uncensored</guid><description><![CDATA[<html><body>

<p>it wasn't just you. </p>
<blockquote>
<div class="message_header"><span>Mon Nov 23 2020 21:39:23 EST</span> <span>from <a href="do_template?template=user_show?who=ParanoidDelusions">ParanoidDelusions</a> </span></div>
<div class="message_content">
<p>My site is suddenly running dog slow over the public ACE network. Telnet is working, but the webcit interface is very unresponsive. <br /><br />I thought it might be the Pi heating up, and so rebooted it, but the issue persisted. <br /><br />Then I connected directly - and that works fine. <br /><br />I am getting buffering and quality adjustments watching video over my regular ISP gateway too - which is unusual.<br /><br />I've noticed it happen a couple of times today here at Uncensored, too. <br /><br />Wonder if it is an Internet wide thing, something going on with my local ISP, or something going on with ACE specifically. </p>
<p> </p>
<br /><br /></div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4612133</link><pubDate>Tue, 24 Nov 2020 02:39:23 -0000</pubDate><title>Message #4612133</title><guid isPermaLink="false">4612133@Uncensored</guid><description><![CDATA[<html><body>

<p>My site is suddenly running dog slow over the public ACE network. Telnet is working, but the webcit interface is very unresponsive. <br /><br />I thought it might be the Pi heating up, and so rebooted it, but the issue persisted. <br /><br />Then I connected directly - and that works fine. <br /><br />I am getting buffering and quality adjustments watching video over my regular ISP gateway too - which is unusual.<br /><br />I've noticed it happen a couple of times today here at Uncensored, too. <br /><br />Wonder if it is an Internet wide thing, something going on with my local ISP, or something going on with ACE specifically. </p>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4604666</link><pubDate>Mon, 16 Nov 2020 11:03:15 -0000</pubDate><title>Message #4604666</title><guid isPermaLink="false">4604666@Uncensored</guid><description><![CDATA[<html><body>

<p> </p>
<blockquote>
<div class="message_header"><span>Sun Nov 15 2020 23:06:16 EST</span> <span>from ParanoidDelusions @ Uncensored </span></div>
<div class="message_content">
<p> </p>
<blockquote>
<div class="message_header"><span>Sun Nov 15 2020 18:24:30 EST</span> <span>from IGnatius T Foobar @ Uncensored </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY">secure doesn't resolve. telnet does. And I see you got the very next /29 adjacent to mine :) <br /><br />They'll set the reverse DNS to whatever you want. Just open a support ticket.</div>
</div>
</blockquote>
<p>Being that I don't have it set to send Internet mail, reverse DNS shouldn't matter, right? <br /><br />Something is hosed on my subnet. There is a a mailserver set up at Ace's DNS as .98... <br /><br />I tried popping up to .102 and that killed everything... there is another address in my range that is registered in DNS as someone else... but I tried everything... <br /><br />Now I'm back to the .98 address - and nothing is resolving. I guess I'll wait 30 minutes and see if it starts working again. <br /><br />And interesting aside... from my own internal machines, I can get it to resolve going out through my ISP and back in through ACE. <br />But my phone responds that the site doesn't respond. <br /><br />But, I pointed the DYDNS forwarder to the .98 address, and that works from the phone... <br /><br />So... something screwy is afoot. <br /><br />My BBS can't really afford extended downtime. It is already on life support. :) </p>
<p> </p>
<br /><br /></div>
</blockquote>
<p>Well, I submitted a ticket, then went to bed. Then I woke up and I remembered that when my "networking guy," helped me set everything up, I noticed the gateway was wrong, and he fixed it and told me "remember this command, you may need it if it doesn't stick." So I came down, browsed history, found the command and issued it. Then I checked, and connectivity was back. Not sure if it was back before I issued the command. But the issue with a tracert of my ip address claiming it is mail.iymf.net still persists, so I'm thinking Ace hasn't fixed that yet - and it was just being impatient about waiting for DNS caches to flush and authoritative DNS to push. <br /><br />Either way, I seem to be fully back. I can even get there from my phone. Hopefully the handful of "callers," I had have not given up. It was probably a bandaid that needed to be ripped off, in either case. </p>
<p> </p>
<p> </p>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4604412</link><pubDate>Mon, 16 Nov 2020 04:06:16 -0000</pubDate><title>Message #4604412</title><guid isPermaLink="false">4604412@Uncensored</guid><description><![CDATA[<html><body>

<p> </p>
<blockquote>
<div class="message_header"><span>Sun Nov 15 2020 18:24:30 EST</span> <span>from IGnatius T Foobar @ Uncensored </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY">secure doesn't resolve. telnet does. And I see you got the very next /29 adjacent to mine :) <br /><br />They'll set the reverse DNS to whatever you want. Just open a support ticket. </div>
</div>
</blockquote>
<p>Being that I don't have it set to send Internet mail, reverse DNS shouldn't matter, right? <br /><br />Something is hosed on my subnet. There is a a mailserver set up at Ace's DNS as .98... <br /><br />I tried popping up to .102 and that killed everything... there is another address in my range that is registered in DNS as someone else... but I tried everything... <br /><br />Now I'm back to the .98 address - and nothing is resolving. I guess I'll wait 30 minutes and see if it starts working again. <br /><br />And interesting aside... from my own internal machines, I can get it to resolve going out through my ISP and back in through ACE. <br />But my phone responds that the site doesn't respond. <br /><br />But, I pointed the DYDNS forwarder to the .98 address, and that works from the phone... <br /><br />So... something screwy is afoot. <br /><br />My BBS can't really afford extended downtime. It is already on life support. :) </p>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4604313</link><pubDate>Sun, 15 Nov 2020 23:24:30 -0000</pubDate><title>Message #4604313</title><guid isPermaLink="false">4604313@Uncensored</guid><description><![CDATA[secure doesn't resolve.  telnet does.   And I see you got the very next /29
adjacent to mine  :) 
  
 They'll set the reverse DNS to whatever you want.  Just open a support ticket.

]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4603979</link><pubDate>Sun, 15 Nov 2020 13:12:13 -0000</pubDate><title>Message #4603979</title><guid isPermaLink="false">4603979@Uncensored</guid><description><![CDATA[<html><body>

<p>If it isn't reachable, the damage is probably already done, and I might as well pull everything out and set it up right while I wait for the ISP to fix the MX record in their DNS. </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4603964</link><pubDate>Sun, 15 Nov 2020 13:02:50 -0000</pubDate><title>Message #4603964</title><guid isPermaLink="false">4603964@Uncensored</guid><description><![CDATA[<html><body>

<p>So, for now, I didn't want to disrupt the connection to my BBS while I create a bunch of new records to point directly to the BBS, remove the forwarding records, and disable the DDNS - and I realized that the easy way to start using the new static IP address was to simply replace the DHCP address in my DDNS service with the static one. Not exactly elegant, and probably the kind of thing that would make an actual networking professional want to claw his eyes out, but it should work. <br /><br />And it does, for me. <br /><br />But I haven't had a single caller to the BBS since I made the change. <br /><br />Doing some network investigation using some web based tools, a reverse lookup on the IP address I was assigned shows that it resolves as a mail server. I looked up the whois registry on that domain, and it is a yogurt and yoga company (I dunno... I guess they go together)... and that domain seems to be managed or hosted by the ISP I've purchased the block of IP addresses from as the authoritative DNS
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4584827</link><pubDate>Wed, 16 Sep 2020 18:10:43 -0000</pubDate><title>Message #4584827</title><guid isPermaLink="false">4584827@Uncensored</guid><description><![CDATA[That's ok, they changed their name from CenturyLink to "Lumen". 
  
 Now "Lumen" can say they've never had any worldwide outages. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4581598</link><pubDate>Mon, 31 Aug 2020 10:48:23 -0000</pubDate><title>Message #4581598</title><guid isPermaLink="false">4581598@Uncensored</guid><description><![CDATA[In other news, CenturyLink borked their BGP, yesterday morning, and broke
a significant part of the internet, worldwide, for about 6 hours. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4574035</link><pubDate>Mon, 27 Jul 2020 13:06:58 -0000</pubDate><title>Message #4574035</title><guid isPermaLink="false">4574035@Uncensored</guid><description><![CDATA[Well I'm back to running my own caching DNS server on my main computer.  No
third-party anything, straight to the root servers, and I can decide which
domains to block. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4539725</link><pubDate>Tue, 07 Apr 2020 13:38:56 -0000</pubDate><title>Message #4539725</title><guid isPermaLink="false">4539725@Uncensored</guid><description><![CDATA[ > 2020-04-07 09:36 from IGnatius T Foobar   
 >OpenDNS charges for that service, though.  And they provide all sorts  

 >of lovely "logs" to the administrator so that you can doxx your users  

 >when they stray off the ranch.   
 >   
 >  
  
 I know they have paid plans, but they also had a free tier with parental
controls at least. Or they used to have it. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4539720</link><pubDate>Tue, 07 Apr 2020 13:36:29 -0000</pubDate><title>Message #4539720</title><guid isPermaLink="false">4539720@Uncensored</guid><description><![CDATA[OpenDNS charges for that service, though.  And they provide all sorts of lovely
"logs" to the administrator so that you can doxx your users when they stray
off the ranch. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4539712</link><pubDate>Tue, 07 Apr 2020 13:25:00 -0000</pubDate><title>Message #4539712</title><guid isPermaLink="false">4539712@Uncensored</guid><description><![CDATA[Public DNS with parental controls or anti-malware controls are not exactly
new. OpenDNS has been offering that for years already. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4539395</link><pubDate>Mon, 06 Apr 2020 14:05:23 -0000</pubDate><title>Message #4539395</title><guid isPermaLink="false">4539395@Uncensored</guid><description><![CDATA[ > 2020-04-05 14:57 from IGnatius T Foobar     
 >I'm not sure how to feel about that.  In this case it's good, but     
 >imagine if Google started doing that to 8.8.8.8 (and they would     
 >definitely do it to 8.8.8.8 and not some alternate address).  Google's 
   
 >editorial control over the Internet would be even more enhanced.     
 >     
 >    
    
 You can use it or not.  They've got one for parental control and one for
parental control + malware.     
  
  
 Maybe there's an interesting service to be had - a comparative DNS system....
 Or maybe it's time for caching DNS to die. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4539218</link><pubDate>Sun, 05 Apr 2020 18:57:31 -0000</pubDate><title>Message #4539218</title><guid isPermaLink="false">4539218@Uncensored</guid><description><![CDATA[I'm not sure how to feel about that.  In this case it's good, but imagine
if Google started doing that to 8.8.8.8 (and they would definitely do it to
8.8.8.8 and not some alternate address).  Google's editorial control over
the Internet would be even more enhanced. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4538388</link><pubDate>Thu, 02 Apr 2020 15:15:49 -0000</pubDate><title>Message #4538388</title><guid isPermaLink="false">4538388@Uncensored</guid><description><![CDATA[Cloudflare's 1.1.1.1 DNS is now offering parental DNS and malware protection.
 A quick and dirty hack, but smart. 
  
 https://www.bleepingcomputer.com/news/security/cloudflare-launches-a-dns-based-parental-control-service/

]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4537546</link><pubDate>Mon, 30 Mar 2020 13:59:20 -0000</pubDate><title>Message #4537546</title><guid isPermaLink="false">4537546@Uncensored</guid><description><![CDATA[Autonomous System Numbers (ASNs)?  Probably quite a lot of them, I would imagine.
 Now that pretty much everything supports 32-bit ASNs it isn't quite as big
a deal; we won't run out of them but they still should be recovered. 
  
 The same thing should hold true for IPv4 addresses, actually.  If you don't
actually announce them into the global table you don't get to keep them. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4536757</link><pubDate>Fri, 27 Mar 2020 15:10:17 -0000</pubDate><title>Message #4536757</title><guid isPermaLink="false">4536757@Uncensored</guid><description><![CDATA[Really? Hahahaha, gotta love the Internet and its management.   
  
 I have heard there are many Autonomous ZOns assigned to defunct entities
and there is no good way of recovering them, or at least no ongoing effort.

]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4536575</link><pubDate>Thu, 26 Mar 2020 21:57:49 -0000</pubDate><title>Message #4536575</title><guid isPermaLink="false">4536575@Uncensored</guid><description><![CDATA[Meanwhile ... some dude in Asia suddenly realized he was sitting on an unused
/8 and is giving it back to APNIC. 
  
 Geez. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4491235</link><pubDate>Wed, 09 Oct 2019 20:00:02 -0000</pubDate><title>Message #4491235</title><guid isPermaLink="false">4491235@Uncensored</guid><description><![CDATA[Right, so that's what NAT464 is.  IPv4 is translated to IPv6 and then back
to IPv4 at the carrier's edge network.  It works fine on access networks;
you just wouldn't want to try running any servers on it.  I'm perfectly fine
having it on my mobile, but I'd find it annoying if my home router didn't
have a native public IPv4. 
  
 I still believe there's going to be a tipping point where IPv6 suddenly goes
gangbusters and everyone begins a rush to make everything work on it natively.
 But, it's hard to determine when that'll happen.  It could happen next year
or it could take another 10 years.  The problem is that IPv4 is still "working
just fine" from the perspective of most people. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4491188</link><pubDate>Wed, 09 Oct 2019 16:26:40 -0000</pubDate><title>Message #4491188</title><guid isPermaLink="false">4491188@Uncensored</guid><description><![CDATA[DS-Lite is when they connect you through an ipv6 only network and give ipv4
to you via tunnel. So you get full ipv6 and lame ipv4. In theory. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4490876</link><pubDate>Tue, 08 Oct 2019 12:58:48 -0000</pubDate><title>Message #4490876</title><guid isPermaLink="false">4490876@Uncensored</guid><description><![CDATA[Isn't DS-Lite a NAT464 solution?  That's what I get on my mobile when it's
not connected to wifi. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4490699</link><pubDate>Mon, 07 Oct 2019 21:01:43 -0000</pubDate><title>Message #4490699</title><guid isPermaLink="false">4490699@Uncensored</guid><description><![CDATA[ > 2019-10-07 09:49 from IGnatius T Foobar     
 >The salesman doesn't need to know what it is.  I'm pretty sure all the 
   
 >big ISPs are doing PD if they do IPv6 at all, and the consumer grade   
 
 >routers all seem to know how to handle it.     
 >     
 >    
    
 Maybe it is so over there.   
  
 Over here you get a lame DS-lite (if you get something) and a single prefix
for a single LAN network assigned. I talked to a tech and he told me the networking
gear and the routers they were giving to customers support prefix delegation
but they are just not setting it up. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4490610</link><pubDate>Mon, 07 Oct 2019 13:49:54 -0000</pubDate><title>Message #4490610</title><guid isPermaLink="false">4490610@Uncensored</guid><description><![CDATA[The salesman doesn't need to know what it is.  I'm pretty sure all the big
ISPs are doing PD if they do IPv6 at all, and the consumer grade routers all
seem to know how to handle it. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4487096</link><pubDate>Mon, 23 Sep 2019 21:23:36 -0000</pubDate><title>Message #4487096</title><guid isPermaLink="false">4487096@Uncensored</guid><description><![CDATA[That is the problem, many providers don't know what PD means in DHCPv6-PD.
Most ISP salesmen just know the basics to sell ISP plans to grandma, you will
be lucky to find one who knows who in the firm knows what ipv6 is, and if
they find it for you, they will tell you "yeah, prefix delegation in your
segment does not work." 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4487042</link><pubDate>Mon, 23 Sep 2019 18:37:20 -0000</pubDate><title>Message #4487042</title><guid isPermaLink="false">4487042@Uncensored</guid><description><![CDATA[The key word is "DHCPv6-PD".  If your ISP and your router both support this
mode of operation, your client devices will have globally routable IPv6 addresses
assigned to them.  Now, the router will probably block incoming IPv6 connections
by default, like all firewalls should, but opening something up will only
involve a firewall rule, instead of also having to map a port. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4485125</link><pubDate>Mon, 16 Sep 2019 14:35:10 -0000</pubDate><title>Message #4485125</title><guid isPermaLink="false">4485125@Uncensored</guid><description><![CDATA[  
 Yeah, I have some awareness of that side of it, although I'd like to understand
it better. 
  
 I wanted to have IPv6 at home for a while, for this very reason.  But, y'know,
Comcast sucks.  They provide it, but clumsily. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4485116</link><pubDate>Mon, 16 Sep 2019 14:10:55 -0000</pubDate><title>Message #4485116</title><guid isPermaLink="false">4485116@Uncensored</guid><description><![CDATA[The #1 vulnerability in IPv6 right now is quite simple: someone didn't know
IPv6 was activated, and because of that, many things are wide open for access.
 The very thing that makes IPv6 awesome, which is the end of using NAT, is
also the thing that makes it tricky to secure, because there's no default
position of something being inaccessible from the Internet because you didn't
do a NAT mapping.  It's always available unless you stick an ACL in front
of it. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4485068</link><pubDate>Mon, 16 Sep 2019 10:23:52 -0000</pubDate><title>Message #4485068</title><guid isPermaLink="false">4485068@Uncensored</guid><description><![CDATA[  
 Gah.  NAT-over-IP6 just... no... 
  
 There are *so* many IP addresses in IPv6.  And certain people don't seem
to understand this.  A certain university hired us to perform penetration
testing against their network environment.  They wanted both IPv4 and IPv6.
 They didn't understand why we didn't offer IPv6 port scanning.  They didn't
understand that there isn't enough time in the world to scan *all* *those*
*ip* *addresses* for open ports, even for their 'small' network. 
  
 And if we can't really do it, an attacker can't, either. 
  
 I'm intrigued, though, at what new vulnerabilities folks will find in IPv6,
for all the trouble taken to secure it. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4483283</link><pubDate>Mon, 09 Sep 2019 14:48:53 -0000</pubDate><title>Message #4483283</title><guid isPermaLink="false">4483283@Uncensored</guid><description><![CDATA[ > 2019-09-06 23:47 from IGnatius T Foobar   
 >There are still people who want NAT66, because muh security by   
 >obscurity.  
 > I wouldn't let these people anywhere near my network.   
  
 That is correct. Stateful packet filters handle this problem in an equally
secure way without requiring NAT 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4483150</link><pubDate>Mon, 09 Sep 2019 05:16:58 -0000</pubDate><title>Message #4483150</title><guid isPermaLink="false">4483150@Uncensored</guid><description><![CDATA[<html><body>

<p> </p>
<blockquote>
<div class="message_header"><span>Thu Sep 05 2019 09:35:44 EDT</span> <span>from IGnatius T Foobar @ Uncensored </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY">Until the mid 1990's, having Internet at all meant having a globally unique, and usually static, IPv4 address. Back then, the end-to-end nature of IP was usable. Dynamic addressing and NAT ended that, which is one reason so many consumer products are tied to a hosted service if you want to be able to reach them remotely. IPv6 will fix that, but its adoption is long overdue. <br /><br />From 1996 until 2000, this BBS was attached to the Internet on a dialup connection. <br />I paid my ISP for a static IP address and permission to keep the connection pinned up over an unmetered local call. It was crude, but it worked, and it saved the board from extinction when everyone moved over to the Internet. <br />In fact, it became more popular than before because it was multiuser and some old friends returned who had moved out of the area. Eventually I was able to secure a DSL connection with a static IP address and explicit permission to run servers, which served us well until 2007 when I mo
</div>
</blockquote>
<p>Well, even when my DNS was borked - the IP address was still working fine, of course. The problem is, my ISP gives dynamic IPs - and though they don't rotate often, they do rotate - which ties me to DNS and DDNS for now. If there is a better way, I'll be the first in line. ;) </p>
<p> </p>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4482747</link><pubDate>Sat, 07 Sep 2019 12:32:06 -0000</pubDate><title>Message #4482747</title><guid isPermaLink="false">4482747@Uncensored</guid><description><![CDATA[Well, NAT66 is prety much the only way you can have ipv6 subnetworks if they
don't delegate good prefixes for you... which really sucks... I mean, really...

 It has occurd to me that many intercepting http proxies I am running depend
on some form of friendly nat, so it is not as if all nat is bad. It is massive
nat and nat as firewall what is ugly. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4482632</link><pubDate>Sat, 07 Sep 2019 03:47:27 -0000</pubDate><title>Message #4482632</title><guid isPermaLink="false">4482632@Uncensored</guid><description><![CDATA[There are still people who want NAT66, because muh security by obscurity.
 I wouldn't let these people anywhere near my network. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4482527</link><pubDate>Fri, 06 Sep 2019 17:07:16 -0000</pubDate><title>Message #4482527</title><guid isPermaLink="false">4482527@Uncensored</guid><description><![CDATA[ > NAT66 exists but, thankfully, it doesn't seem to be widely deployed.  

  
 egad yes. I mean the whole point of v6 is to avoid NAT 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4482502</link><pubDate>Fri, 06 Sep 2019 16:55:03 -0000</pubDate><title>Message #4482502</title><guid isPermaLink="false">4482502@Uncensored</guid><description><![CDATA[When IPv6 is available on access networks, the provider will often use DHCPv6-PD
(prefix delegation) to tell the access router what subnet to use on its "inside"
network.  The router can then do whatever it wants with that space -- it can
offer DHCPv6 on its own, it can announce its presence to allow autoconfiguration
to work (assuming, as is usually the case, that the inside network is a /64),
etc. 
  
 NAT66 exists but, thankfully, it doesn't seem to be widely deployed. 
  
 As for static vs dynamic, I don't know whether the /64 assigned to a subscriber
using DHCPv6-PD is static or dynamic.  The transport address used on the outside
of the router will not be static, but with NAT out of the picture, the transport
address doesn't matter anymore.  So it should be a simple matter of "router
joins the network, head end identifies the subscriber, and routes their static
/64 to that transport
address" ... but who knows whether they are actually doing that.  Hopefully
they will understand that a home network that is constantly renumbering itself
is a bad idea. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4482180</link><pubDate>Thu, 05 Sep 2019 14:17:40 -0000</pubDate><title>Message #4482180</title><guid isPermaLink="false">4482180@Uncensored</guid><description><![CDATA[ >you want to be able to reach them remotely.  IPv6 will fix that, but   
 >its adoption is long overdue.   
  
 I am very skeptical of ipv6 for a number of reasons. 
 I suspect many ISPs could have been offering cheap or free static IP addresses
for residential subscription for a long time and they didn't, because it makes
more sense for them to offer dynamic by default and charge premium for static.
I don't see how ipv6 can change that. ISPs can buy ipv6 blocks and refrain
from offering static addressing the same as they do with ipv4. 
 Also, adoption is slow because implementations suck balls. Many ISPs won't
allow you to subnet your own network. Mind you, this is a thing that creeps
me out... in bad old ipv4 you were free to subnet your own network to your
heart's content. In ipv6, if you want your subnetworks to be Internet routable,
the ISP has to explicitly assign you a prefix you
can work with. This is, you need their PERMISSION to subnet your network.
Or you start using local address spaces (sucks) or you start hacking NAT in
(in which case, why did you migrate to ipv6?) 
 I think it is good that we have ipv6 so get rid of ugly LS-NATs users are
already suffering, but I am REALLY pessimistic. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4482165</link><pubDate>Thu, 05 Sep 2019 13:35:44 -0000</pubDate><title>Message #4482165</title><guid isPermaLink="false">4482165@Uncensored</guid><description><![CDATA[Until the mid 1990's, having Internet at all meant having a globally unique,
and usually static, IPv4 address.  Back then, the end-to-end nature of IP
was usable.  Dynamic addressing and NAT ended that, which is one reason so
many consumer products are tied to a hosted service if you want to be able
to reach them remotely.  IPv6 will fix that, but its adoption is long overdue.

  
 From 1996 until 2000, this BBS was attached to the Internet on a dialup connection.
 I paid my ISP for a static IP address and permission to keep the connection
pinned up over an unmetered local call.  It was crude, but it worked, and
it saved the board from extinction when everyone moved over to the Internet.
 In fact, it became more popular than before because it was multiuser and
some old friends returned who had moved out of the area.  Eventually I was
able to secure a DSL connection with a static IP address
and explicit permission to run servers, which served us well until 2007 when
I moved it into a hosting center. 
  
 There's nothing about DNS that makes it a baked-in part of using the Internet.
 It's really just based on a consensus that everyone's going to use the same
root.  Sidenets can -- and should -- use their own discovery and location
protocols. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4482010</link><pubDate>Thu, 05 Sep 2019 02:00:11 -0000</pubDate><title>Message #4482010</title><guid isPermaLink="false">4482010@Uncensored</guid><description><![CDATA[ Well, I'm not paying for a static IP, so I'm breaking all kinds of rules
hosting a public faced server that is open to multiple users. Basically my
BBS is the modern version of a pirate radio station. So, I'm risking getting
my account suspended ultimately. Which is why finding ways to evade the ways
they might block me from hosting a Citadel server or making it public faced
is interesting to me. I'm not really doing this for profit - so I don't want
to pay a premium - and the amount of traffic is minimal. If it got very big,
I suppose I might consider a more professional, permanent solution.  
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4481862</link><pubDate>Wed, 04 Sep 2019 14:30:02 -0000</pubDate><title>Message #4481862</title><guid isPermaLink="false">4481862@Uncensored</guid><description><![CDATA[Dynamic DNS is nice for experimenting, but at the end of the day you are going
to save a lot of trouble using static. Specially if you are running something
like an email service in it. 
 Banning a whole Dynamic DNS provider is just bollocks. 
 Which reminds me: do you know of Opennic? It is an alternative no IANA governed
DNS namespace. They even have their own dynamic dns provider (in their own
namespace, obviously). If you are the only one who needs to access a service
located in a dynamic range, they are quite a good solution. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4481739</link><pubDate>Wed, 04 Sep 2019 05:03:41 -0000</pubDate><title>Message #4481739</title><guid isPermaLink="false">4481739@Uncensored</guid><description><![CDATA[Did you notice that secure.wallofhate.com disappeared for awhile? First Facebook
banned me from posting the URL on Facebook... they called it SPAM. They banned
the entire DDNS provider I use... which I figured might cause me complications.
Then suddenly, it just stopped working. It is back now - but it was just long
enough to really kill traffic to the site... and everyone involved on the
DNS side can go... "Wow, that was weird - must have been some sort of hiccup...
Reason For Outage undetermined."    
  
  
   
 So if we can get a solution for dynamic IP addresses and dynamic DNS being
the single point of failure soon - that would be just awesome. :)  
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4473960</link><pubDate>Fri, 09 Aug 2019 00:30:56 -0000</pubDate><title>Message #4473960</title><guid isPermaLink="false">4473960@Uncensored</guid><description><![CDATA[<html><body>

<p>Well said.</p>
<p> </p>
<p>I am starting to be afraid of the clearnet (regular Internet). Most of my Internet activity is in shady deep web/hidden services/minoritary platforms these days because I don't feel safe as a user. It is not because I am concerned that governments or corporations might mine my data (which they would) but because there is this threat of ideological, legal and social persecution.</p>
<p> </p>
<p>I mean, I am in the very unpoliced parts of the Internet, dealing with the ocasional nutjob, sexual predator, you name it, on a daily basis. And I have zero problems. I recently registered to a web service without the protection of an anonimity layer for the first time in more than a year and I got into a hell of a lot of trouble because some service administrator interpretated that I was poaching kids online. How fucked up that is. And now this people has my data.There is this tendency to bubblewrap a certain sector of the population at the expense of making the lives of everybody else impossible, and it is getting very bad on the Internet, but if you use an anonimity network overlay it makes you tremendously free. I mean, if I post "My humor is so black that it has been arrested" in a joke site and some administrator threatens to sue me or whatever for racism, I know I am covered because it is very unlikely this person has the resources to identify me. If I post a collection of political books with no p
<p> </p>
<p>Laws and sociological conditions for setting clearnet services are getting crazy. Check that European GDPR, for example. In theory it is designed to protect users, which is a good thing. In practice, it makes a lot of developers to waste tons of time and money makig their services compliant. Then they take the data of users and sell them anyway. The people who gets damaged by this thing are the small sysadmins who want to set a hobby site and now have to hire ten lawyers in order to ensure the cops won't rip their balls off. Well, there are lots of laws that can get your website trashed in many places of the world. And you usually don't know about them until they come knocking at your door with a warrant or a very nice fine.</p>
<p> </p>
<p>So yes, I agree with IG. Side channel tech is extremely important so at least a certain sector of the population can procure a safe space for itself. We really need it.</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4472834</link><pubDate>Mon, 05 Aug 2019 16:14:47 -0000</pubDate><title>Message #4472834</title><guid isPermaLink="false">4472834@Uncensored</guid><description><![CDATA[I really do believe that the "worst people" who are the focus of organized
takedowns are the people who need to have their speech protected the most.
 Not because of any approval of what they say or promote, but because protecting
unpopular speech is the VERY ESSENCE of protecting free speech in general.

  
 You can see that in the news today regarding 8chan. 
  
 The problem, of course, is that the Orwellian power mongers and their SJW
useful idiots continue to expand the scope of what they consider wrongthink.
 They also continue to expand the number of pinch points where they can silence
dissenting voices -- not just the big places like Fecesbook and Twatter where
they can simply shut them off, or Google/YouTube where they can de-rank and
de-monetize, but now also the domain registrars and payment processors, where
they can choke the life out of dissenters. 
  
 This is the part of the
conversation where someone usually says "The more the Empire tightens its
grip, the more star systems slip through its fingers."  This isn't quite a
perfect match for that analogy, but it's close.  I am likening it more to
the overuse of broad-spectrum antibiotics creating a superbug.  First the
bad people start censoring major social media sites, and the good people respond
by creating their own.  The bad people mount an assault on those sites, and
the good people respond by making the alternative sites into a distributed
network.  The bad people then go after domain registrars, and the good people
respond by finding a way to keep the network operating without DNS. 
  
 Make no mistake: the people who operate Facebook, Twitter, and Google are
currently the absolute worst people in the world.  If their power is not removed
by returning the Internet to a decentralized, open, and uncensored
platform, their power will eventually be removed when, in the immortal words
of Douglas Adams, they "will be the first up against the wall when the revolution
comes." 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4468493</link><pubDate>Sat, 20 Jul 2019 22:10:50 -0000</pubDate><title>Message #4468493</title><guid isPermaLink="false">4468493@Uncensored</guid><description><![CDATA[<html><body>

<p> </p>
<blockquote>
<div class="message_header"><span>Sat Jul 20 2019 09:02:11 EDT</span> <span>from IGnatius T Foobar @ Uncensored </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY">If we get to that point, it isn't going to be about building systems that the government can't break into. They measure their computing power in *acres*. <br />It would be about staying out of their view. Even just having systems that don't automatically trip their scanning-everyone software would be fine. <br /><br />For example, your "safe" 8-bit computer might be used to run software that hides a message inside a dummy text, which is then copied (perhaps by hand) to a "compromised" 64-bit computer and sent over the Internet to its recipient. <br /><br />Thankfully, we do not yet live in a world where that needs to be done. For the time being, anyone who wants to avoid the current crop of bad actors can simply steer clear of them. </div>
</div>
</blockquote>
<p>Well, whatever it becomes - it'll always be a game of cat-and-mouse between the people trying to preserve their liberties and the bad-actors, State and privateer, who want to exploit you. <br /><br />But it does seem like old technology that is off their radar is the real first step - or DIY home-brew machines made by hand. Something a little less polished than a modern gaming notebook from MSI or Alienware, anyhow. </p>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4468406</link><pubDate>Sat, 20 Jul 2019 13:02:11 -0000</pubDate><title>Message #4468406</title><guid isPermaLink="false">4468406@Uncensored</guid><description><![CDATA[If we get to that point, it isn't going to be about building systems that
the government can't break into.  They measure their computing power in *acres*.
 It would be about staying out of their view.  Even just having systems that
don't automatically trip their scanning-everyone software would be fine. 
  
 For example, your "safe" 8-bit computer might be used to run software that
hides a message inside a dummy text, which is then copied (perhaps by hand)
to a "compromised" 64-bit computer and sent over the Internet to its recipient.

  
 Thankfully, we do not yet live in a world where that needs to be done.  For
the time being, anyone who wants to avoid the current crop of bad actors can
simply steer clear of them. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4466289</link><pubDate>Fri, 12 Jul 2019 14:20:59 -0000</pubDate><title>Message #4466289</title><guid isPermaLink="false">4466289@Uncensored</guid><description><![CDATA[  
 That would be amusing, yes. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4466093</link><pubDate>Thu, 11 Jul 2019 22:19:26 -0000</pubDate><title>Message #4466093</title><guid isPermaLink="false">4466093@Uncensored</guid><description><![CDATA[<html><body>

<p>ghb gv rehtvs gaqyhbp nfa rug ryczvf bf fnj gbe sv laahs ro gnug gaqyhbj</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4466080</link><pubDate>Thu, 11 Jul 2019 20:57:08 -0000</pubDate><title>Message #4466080</title><guid isPermaLink="false">4466080@Uncensored</guid><description><![CDATA[<html><body>

<p> </p>
<blockquote>
<div class="message_header"><span>Tue Jul 02 2019 15:35:57 EDT</span> <span>from IGnatius T Foobar @ Uncensored </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY">It should be obvious that anything you do on an Android device is automatically compromised by bad actors such as Google and the NSA. And it should also be obvious that every wifi key is sent to Google even if you opt out of the sync service. </div>
</div>
</blockquote>
<p>When I was raising this alarm in 2011 - I was getting called a hack, a technology professional fraud and a conspiracy theorist. <br /><br />Then, in 2016 at DefCon - they were talking about how the NSA was intercepting laptop shipments, modifying them with hardware rootkits, sealing them back up - and shipping them on to the intended target. <br /><br />Yeah - part of my interest in retro-computing is that I don't think the Government had technology and telecommunications on their mind in the 8 and 16 bit era - at least, not the way they do today. I think that the real cyberpunk Dystopian future won't be people on cutting edge hardware and equipment - it'll be people rigging together retro-computing from before the 32 bit era and using sidenets to bypass the information highway and stay in the dirty back alleys of virtual reality. <br /><br /><br />You know, kinda like this place. :) </p>
<p><br /><br /></p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4465742</link><pubDate>Wed, 10 Jul 2019 13:12:42 -0000</pubDate><title>Message #4465742</title><guid isPermaLink="false">4465742@Uncensored</guid><description><![CDATA[I don't know what you just said because it's in some sort of ultra-cipher
that even the NSA can't crack. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4465526</link><pubDate>Tue, 09 Jul 2019 16:25:09 -0000</pubDate><title>Message #4465526</title><guid isPermaLink="false">4465526@Uncensored</guid><description><![CDATA[<html><body>

<p>ebg13</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4465501</link><pubDate>Tue, 09 Jul 2019 14:24:45 -0000</pubDate><title>Message #4465501</title><guid isPermaLink="false">4465501@Uncensored</guid><description><![CDATA[Yeah.  I wonder if there's any major technology that we *can* trust these
days? 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4463975</link><pubDate>Tue, 02 Jul 2019 21:53:48 -0000</pubDate><title>Message #4463975</title><guid isPermaLink="false">4463975@Uncensored</guid><description><![CDATA[All your data is belong to us. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4463945</link><pubDate>Tue, 02 Jul 2019 19:35:57 -0000</pubDate><title>Message #4463945</title><guid isPermaLink="false">4463945@Uncensored</guid><description><![CDATA[It should be obvious that anything you do on an Android device is automatically
compromised by bad actors such as Google and the NSA.  And it should also
be obvious that every wifi key is sent to Google even if you opt out of the
sync service. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4462073</link><pubDate>Tue, 25 Jun 2019 02:34:27 -0000</pubDate><title>Message #4462073</title><guid isPermaLink="false">4462073@Uncensored</guid><description><![CDATA[<html><body>

<p>ax.25 is cool and all, but hard to get traction at the speeds we usually use.</p>
<blockquote>
<div class="message_header"><span>Thu May 30 2019 05:57:59 PM EDT</span> <span>from IGnatius T Foobar @ Uncensored </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY">That's kind of what the ham radio packet networks are for. Perhaps ax25 can tell you all about ax.25 :) <br /><br />And if the sidenet needs infrastructure, Tor exists today and runs as an overlay over the existing Internet infrastructure. I suppose if the shit really hits the fan, Big Brother will consider the operation of an encrypted overlay as presumption of guilt, but if we get that far, we probably have bigger things to worry about. <br /><br />I've got to be honest though, I originally wanted all of this as a way to drive traffic to my BBS. A way to get back the users that Facebook stole from me and all the other operators of small sites. If I had access to The Button, I *would* push it and nuke Silicon Valley off the map, just so we could get our Internet back. But ... it's clear that the stakes are bigger now; it's not just about finding a way to effect a diaspora from the big sites (see what I did there?), it's now about reversing the power that the big sites are amassing
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4459894</link><pubDate>Sat, 15 Jun 2019 21:39:52 -0000</pubDate><title>Message #4459894</title><guid isPermaLink="false">4459894@Uncensored</guid><description><![CDATA[<html><body>

<p> </p>
<blockquote>
<div class="message_header"><span>Sat Jun 15 2019 08:03:50 EDT</span> <span>from IGnatius T Foobar @ Uncensored </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY"><br />But ... encryption keys? When you connect to wifi from an Android device, your encryption key is captured and sent to Google? That's over the line, and it's enough to flip my opinion on whether that is acceptable behavior. <br />On what basis do they claim this has any value to the customer? </div>
</div>
</blockquote>
<p>User convenience. There is a setting buried in Android settings that stores WiFi keys - ANY WiFi key, on Google Servers so that when a user gets a new Android device and logs in with their Google account, it downloads all their previous WiFi connections so that they can just go to where that AP is and it will connect automatically without having to re-enter the key. <br /><br />They were REALLY upset with me and basically told the German tech site that I was an idiot when I posted this in 2011, and people were divided. A lot of people were responding, "It is totally opt-in when you're setting it up and can be turned off in settings." Which is true, but most people get a device and a Verizon redshirt sets it up and just flips through the screens accepting the defaults and the end user doesn't know this has been selected or how to turn it off. Worse, it isn't granular. You can't turn it on or off on a case by case basis - it is all in or nothing - and <em><span style="text-decoration: underline;">they've d
<p><br /><br /><br />  </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4459815</link><pubDate>Sat, 15 Jun 2019 13:50:30 -0000</pubDate><title>Message #4459815</title><guid isPermaLink="false">4459815@Uncensored</guid><description><![CDATA[<html><body>

<p>Big brother loves you and wants to keep you safe.</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4459751</link><pubDate>Sat, 15 Jun 2019 12:03:50 -0000</pubDate><title>Message #4459751</title><guid isPermaLink="false">4459751@Uncensored</guid><description><![CDATA[waitwaitwhat ... go back to that Android thing. 
  
 I knew about Google maintaining a list of wireless networks, their SSIDs
and MAC addresses.  I consider that to be public information because when
you operate a wireless network you're basically *broadcasting* that information
to anyone who has a radio on that frequency.  And the value of that information
for geolocation is pretty clear. 
  
 But ... encryption keys?  When you connect to wifi from an Android device,
your encryption key is captured and sent to Google?  That's over the line,
and it's enough to flip my opinion on whether that is acceptable behavior.
 On what basis do they claim this has any value to the customer? 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4459345</link><pubDate>Fri, 14 Jun 2019 04:08:35 -0000</pubDate><title>Message #4459345</title><guid isPermaLink="false">4459345@Uncensored</guid><description><![CDATA[<html><body>

<p>Since then, the company I was managing in Ohio got bought out by a San Jose based medical company and I got laid off. <br /><br />Tech Republic had a reorg, and along with most of the staff, I got cut. <br /><br />I've been unable to get picked up by any technology media outlets. I had a couple of gigs for Android Authority. At one point, Jason Perlow of ZDNet and Robert Scoble both scolded me that my right leaning opinions were killing my tech blogging career. Since then, both have de-friended me over Trump. <br /><br />I met a guy out here who worked for HP. He was very excited about my experience and skills and wanted to have me come on as part of his team. I submitted my resume, and never heard from him again. <br /><br />I'm pretty convinced that if the company is based in San Jose or part of the network of Silicon Valley tech companies - my career is pretty much over - and that it has a lot to do with my politics. <br /><br />I haven't been kind to Intel, either, who was a former employer. I ap
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4459342</link><pubDate>Fri, 14 Jun 2019 03:58:52 -0000</pubDate><title>Message #4459342</title><guid isPermaLink="false">4459342@Uncensored</guid><description><![CDATA[<html><body>

<p> </p>
<blockquote>
<div class="message_header"><span>Sun Jun 09 2019 15:51:56 EDT</span> <span>from IGnatius T Foobar @ Uncensored </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY"><br />"The Internet interprets censorship as damage, and routes around it." --John Gilmore, 1993 <br /><br />"Oh yeah? Hold my beer and watch this!" --Zuckerberg, Dorsey, Wojcicki </div>
</div>
</blockquote>
<p>But aren't we doing what the Internet does? I know that there is a very concerted effort to completely de-platform *anyone* that is out of step with the San Jose party line. <br /><br /><br />I was working out at the gym tonight, watching Fox - and I saw a piece on Google and Facebook blacklisting people based on their *real world* actions, purchases, affiliations - and having closed door meetings about how to de-platform people for these actions. <br /><br />So, I wrote this: <br /><br /><a href="https://www.techrepublic.com/blog/it-security/update-google-knows-where-youve-been-and-they-might-be-holding-your-encryption-keys/">https://www.techrepublic.com/blog/it-security/update-google-knows-where-youve-been-and-they-might-be-holding-your-encryption-keys/<br /><br />W</a>hich got picked up worldwide overnight, as far as Germany. <br /><br />Later on, it got revisted by some bigger guns in the blogging community: <br /><br /><a href="https://www.computerworld.com/article/2474851/android-google-knows-n
<p style="font-family: museo-sans, 'Helvetica Neue', Helvetica, Arial, sans-serif, sans-serif; margin: 0px 0px 16px; padding: 0px; font-size: 1.125rem; line-height: 1.875rem; max-width: 620px;">However, this story has, on the whole, flown under the radar. Most tech outlets didn't cover it (Ars Technica and The Register being exceptions) for reasons that escape me.  </p>
<p style="font-family: museo-sans, 'Helvetica Neue', Helvetica, Arial, sans-serif, sans-serif; margin: 0px 0px 16px; padding: 0px; font-size: 1.125rem; line-height: 1.875rem; max-width: 620px;"><span style="font-weight: 900;">1) </span><a style="color: #a31e22;" href="http://www.techrepublic.com/blog/it-security/update-google-knows-where-youve-been-and-they-might-be-holding-your-encryption-keys/" rel="nofollow">Google knows where you've been and they might be holding your encryption keys</a>. June 21, 2011 by Donovan Colbert for TechRepublic. This is the first article I was able to find on the subject. Colbert was not happy, writing:</p>
<blockquote style="margin: 0px 0px 16px; font-size: 1.0625rem; border-left: 5px solid #efefef; padding: 5px 20px; max-width: 620px; color: #000000; font-family: museo-sans, 'Helvetica Neue', Helvetica, Arial, sans-serif, sans-serif; background-color: #ffffff;">
<p style="color: #000000; margin: 1em 0px;"> ... my corporate office has a public, protected wireless access point. The idea that every Android device that connects with that access point shares our private corporate access key with Google is pretty unacceptable ... This isn't just a trivial concern. The fact that my company can easily lose control of their own proprietary WPA2 encryption keys just by allowing a user with an Android device to use our wireless network is significant. It illustrates a basic lack of understanding on the ethics of dealing with sensitive corporate and personal data on the behalf of the engineers, programmers and leadership at Google. Honestly, if there is any data that shouldn't be harvested, stored and synched automatically between devices, it is encryption keys, passcodes and passwords.</p>
</blockquote>
<p style="text-align: left;"><a href="https://www.computerworld.com/article/2474851/android-google-knows-nearly-every-wi-fi-password-in-the-world.html"><br /></a><a href="https://gizmodo.com/google-knows-the-wi-fi-passwords-of-all-android-users-1324036508">https://gizmodo.com/google-knows-the-wi-fi-passwords-of-all-android-users-1324036508<br /><br /></a><a href="https://www.huffpost.com/entry/google-wifi-passwords-android_n_3936809">https://www.huffpost.com/entry/google-wifi-passwords-android_n_3936809<br /><br /><br /></a></p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4458018</link><pubDate>Sun, 09 Jun 2019 19:51:56 -0000</pubDate><title>Message #4458018</title><guid isPermaLink="false">4458018@Uncensored</guid><description><![CDATA[  
 "The Internet interprets censorship as damage, and routes around it."  --John
Gilmore, 1993 
  
 "Oh yeah?  Hold my beer and watch this!"   --Zuckerberg, Dorsey, Wojcicki

]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4457587</link><pubDate>Sat, 08 Jun 2019 05:36:15 -0000</pubDate><title>Message #4457587</title><guid isPermaLink="false">4457587@Uncensored</guid><description><![CDATA[<html><body>

<p>*ratio</p>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4457586</link><pubDate>Sat, 08 Jun 2019 05:35:56 -0000</pubDate><title>Message #4457586</title><guid isPermaLink="false">4457586@Uncensored</guid><description><![CDATA[<html><body>

<p> </p>
<blockquote>
<div class="message_header"><span>Fri Jun 07 2019 17:13:12 EDT</span> <span>from IGnatius T Foobar @ Uncensored </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY">Yup. The best way I've heard it was that they "give people their fifteen minutes of fame, every fifteen minutes." </div>
</div>
</blockquote>
<p>I remember when I was excited about the Democratization of the Web. <br /><br />It didn't quite work out. It is a signal to noise ration - combined with the ability of the incumbents to drown out the opposition in the noise. <br /><br />We're the opposition, the unwashed masses on social media are the noise, and the mainstream media and social media giants are the incumbents. <br /><br />So... we can sit around and bitch about how it is unfair and the game is loaded against us... <br /><br />Or we can figure out a way to upset the status quo and turn the table over. <br /><br />I'm all for kicking over tables and shit. But I hate it when I start the riot and look behind me and all the blokes who said they would be there have disappeared. </p>
<p> </p>
<p> </p>
<p> </p>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4457500</link><pubDate>Fri, 07 Jun 2019 21:13:12 -0000</pubDate><title>Message #4457500</title><guid isPermaLink="false">4457500@Uncensored</guid><description><![CDATA[Yup.  The best way I've heard it was that they "give people their fifteen
minutes of fame, every fifteen minutes." 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4457150</link><pubDate>Thu, 06 Jun 2019 18:01:51 -0000</pubDate><title>Message #4457150</title><guid isPermaLink="false">4457150@Uncensored</guid><description><![CDATA[<html><body>

<p> </p>
<blockquote>
<div class="message_header"><span>Thu Jun 06 2019 11:59:00 AM EDT</span> <span>from fleeb @ Uncensored </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY"><br />People are the problem. </div>
</div>
</blockquote>
<p>I can't argue with that.</p>
<p>Social media has given people who shouldn't have a voice a voice.</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4457146</link><pubDate>Thu, 06 Jun 2019 17:51:27 -0000</pubDate><title>Message #4457146</title><guid isPermaLink="false">4457146@Uncensored</guid><description><![CDATA[People are terrible things. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4457109</link><pubDate>Thu, 06 Jun 2019 15:59:00 -0000</pubDate><title>Message #4457109</title><guid isPermaLink="false">4457109@Uncensored</guid><description><![CDATA[  
 Social Media isn't the problem. 
  
 People are the problem. 
  
 Heh. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4456176</link><pubDate>Mon, 03 Jun 2019 14:21:38 -0000</pubDate><title>Message #4456176</title><guid isPermaLink="false">4456176@Uncensored</guid><description><![CDATA[Does that include small BBS type sites? 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4455703</link><pubDate>Sun, 02 Jun 2019 00:10:53 -0000</pubDate><title>Message #4455703</title><guid isPermaLink="false">4455703@Uncensored</guid><description><![CDATA[<html><body>

<p>Facebook isn't the problem, social media is the problem.</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4455366</link><pubDate>Fri, 31 May 2019 18:32:43 -0000</pubDate><title>Message #4455366</title><guid isPermaLink="false">4455366@Uncensored</guid><description><![CDATA[I'm on MeWe, and it's great in that it's "not Facebook" but there are a couple
of problems: 
  
 1. It's not a distributed service, so I can't write software to turn Citadel
sites into "MeWe nodes". 
  
 2. It's not a distributed service, so as soon as it becomes popular it will
contract SJW Cancer. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4455325</link><pubDate>Fri, 31 May 2019 15:44:06 -0000</pubDate><title>Message #4455325</title><guid isPermaLink="false">4455325@Uncensored</guid><description><![CDATA[MeWe seems to be becoming the Facebook alternative. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4455182</link><pubDate>Fri, 31 May 2019 06:13:20 -0000</pubDate><title>Message #4455182</title><guid isPermaLink="false">4455182@Uncensored</guid><description><![CDATA[<html><body>

<p>I don't think it is hyperbole at all - and I think we should continue to work to drive this to some sort of reality. We might not make a dent in the traffic of mainstream Social Media sites. <br /><br />But we might. <br /><br />I was a big part of what got labeled "The Digg Bury Brigade," by Ole Olson - a liberal troll. The fact was that the conservative voices were getting buried - they were being censored. Ole created this fantasy that we were burying left leaning stories as an organized group, in order to get Conservative stories to the front page. So they changed the algorithm and did all kinds of things in Digg 2.0 that caused the content to become incredibly one sided and biased - they created an echo chamber. Digg went from "The Front Page of the Internet," to a ghost town - and Facebook and Twitter came in and ate their lunch. <br /><br />Facebook and Twitter are currently headed down the same path as Digg - and there is opportunity there once it all falls apart. We just have to figure out how
<p> </p>
<p>Easier said than done. </p>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4455074</link><pubDate>Thu, 30 May 2019 21:57:59 -0000</pubDate><title>Message #4455074</title><guid isPermaLink="false">4455074@Uncensored</guid><description><![CDATA[That's kind of what the ham radio packet networks are for.  Perhaps ax25 can
tell you all about ax.25  :) 
  
 And if the sidenet needs infrastructure, Tor exists today and runs as an
overlay over the existing Internet infrastructure.  I suppose if the shit
really hits the fan, Big Brother will consider the operation of an encrypted
overlay as presumption of guilt, but if we get that far, we probably have
bigger things to worry about. 
  
 I've got to be honest though, I originally wanted all of this as a way to
drive traffic to my BBS.  A way to get back the users that Facebook stole
from me and all the other operators of small sites.  If I had access to The
Button, I *would* push it and nuke Silicon Valley off the map, just so we
could get our Internet back.  But ... it's clear that the stakes are bigger
now; it's not just about finding a way to effect a diaspora from the big sites
(see
what I did there?), it's now about reversing the power that the big sites
are amassing to literally control the minds of everyone in the world. 
  
 Yes, my posts are full of hyperbole but they are directionally accurate.
 Online discourse on a global collection of small BBS's was far more stable
than things are now. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4455028</link><pubDate>Thu, 30 May 2019 19:37:21 -0000</pubDate><title>Message #4455028</title><guid isPermaLink="false">4455028@Uncensored</guid><description><![CDATA[<html><body>

<p>That is pretty cool - and an awesome way to route around the corporate damage that walled gardens create on the Internet. <br /><br />I think we'll see more people innovating solutions like that to create those sidenets and mini-dark-nets that are outside the corporate and government radar. <br /><br />I'm really surprised someone hasn't developed a roll-your-own router node network that connects via P2P to nearby routers to create an alternate mesh. Long haul between urban areas would be difficult to bridge - but in dense urban and suburban areas, WiFi is so ubiquitous I think at least conceptually, it is plausible. Kind of a SETI-at-home style approach to sharing free bandwidth. </p>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4454976</link><pubDate>Thu, 30 May 2019 16:05:47 -0000</pubDate><title>Message #4454976</title><guid isPermaLink="false">4454976@Uncensored</guid><description><![CDATA[My server is already in a really good data center.  Before 2007 however, I
ran it at home.  My ISP was Ace Innovative (acedsl.com) which is very hobbyist-friendly,
giving everyone a static IP address and permission to run servers.  They got
screwed over by Verizon, who decided unilaterally that the portion of the
1996 telecom act that required them to offer DSL circuits as unbundled elements,
didn't apply to FiOS, so as everyone moved to fiber we had to get it directly
from Verizon and over their IP network. 
  
 Ace offers another solution though, one I would consider if I ever moved
my servers back home.  For a monthly fee, they send you a router which builds
a VPN connection back to their network over whatever Internet you have at
home, and they give you a block of static IP addresses.  Your local ISP doesn't
see anything except an outgoing VPN connection, identical to what any telecommuter
has running all the time. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4454826</link><pubDate>Thu, 30 May 2019 05:49:56 -0000</pubDate><title>Message #4454826</title><guid isPermaLink="false">4454826@Uncensored</guid><description><![CDATA[<html><body>

<p>I've ran mail servers on residential networks before - but this may have been well before ISPs learned to block port 25. <br /><br /><br />And I haven't tried recently. The short answer then is to upgrade to a business class service that assigns a static IP *and* allows server hosting - which won't be cheap. <br /><br />Or to use an external host... for Citadel - which uses Linux - I suspect there are solutions which are available for as little as $10 a month that will give you all of this. <br /><br />My friend used to own a Linux based hosted solution called tuxfarm... <br /><br /><a href="http://www.tuxfarm.com/">http://www.tuxfarm.com/<br /><br />t</a>here it is... it is probably cheaper and more secure than trying to share the same residential connection you use for your day to day surfing. And you'll be supporting my friend. </p>
<p> </p>
<p>Win/Win. </p>
<p> </p>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4454171</link><pubDate>Mon, 27 May 2019 23:32:03 -0000</pubDate><title>Re: Citadel behind a switch, switch directly connected to fiber optic</title><guid isPermaLink="false">4454171@Uncensored</guid><description><![CDATA[Well, first of all your question isn't really specific to Citadel; this is
a legit question for any service you'd care to expose to the public Internet,
such as a web or mail server, etc. 
  
 If you're talking about a typical residential-grade Internet service, the
real problem is that the ISP will usually only allow you to have one IP address
at a time.  You are referring to a "fiber optic line" so I'm assuming it's
a PON such as Verizon FiOS or Google Fiber, so you've probably got an Optical
Network Terminal that feeds the WAN port of a router, beyond which is your
private LAN.  Simply "splitting" the connection from the ONT with a switch
will usually result in either your router getting Internet access, or your
server computer, but not both. 
  
 The common solution is to find the configuration section in your router that
lets you map incoming ports.  Enter the port numbers you want to
permit (such as port 80 for HTTP, 443 for HTTPS, 25 for SMTP, etc) and map
them to the same ports on the IP address of your server, which is inside the
router on the LAN side. 
  
 Once you have it working, you'll generally face two problems: 
  
 1. Unless you're on one of the rare ISPs that gives you a static IP address,
your public IP address will change from time to time.  This is usually solved
by signing up for one of the many dynamic DNS providers out there, some of
which are free, and running the little program they give you to keep your
DNS entry updated from time to time. 
  
 2. If you intend to run an email server, many ISPs block port 25, often in
both directions.  This generally isn't solvable without help from an outside
source. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4453348</link><pubDate>Fri, 24 May 2019 11:27:36 -0000</pubDate><title>Citadel behind a switch, switch directly connected to fiber optic</title><guid isPermaLink="false">4453348@Uncensored</guid><description><![CDATA[<html><body>

<p>Is it possible to make citadel visible and accessible from outside the LAN if the topography is as follows</p>
<p>(Fiber Optic line) --- (Switch, Netgear 5 gigabit) ---[port x]---(Computer with citadel)</p>
<p>Something like STUN perhaps, or something else?</p>
<p>Thanks for the help.</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4441315</link><pubDate>Wed, 17 Apr 2019 16:36:09 -0000</pubDate><title>Message #4441315</title><guid isPermaLink="false">4441315@Uncensored</guid><description><![CDATA[Yes.  You could use nginx as a proxy in several different ways.  It can do
the SSL offload instead of WebCit itself if that's what you're into.  It can
map to a different port.  Etc. 
  
 And it will get better.  webcit-ng is being built from the start so that
every single URI begins with the "/ctdl" prefix, so that in the future you'll
be able to configure a proxy webserver to just send requests starting with
that prefix to Citadel, and send other transactions elsewhere.  People who
operate load balancers love that stuff. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4441053</link><pubDate>Tue, 16 Apr 2019 17:11:50 -0000</pubDate><title>Message #4441053</title><guid isPermaLink="false">4441053@Uncensored</guid><description><![CDATA[  
 Couldn't one put Citadel on pretty much any port and use something like nginx
to shuttle between the exposed 443 and whatever port you've put Citadel on?

  
 (I say 'nginx', as I think that's what it was designed for, as opposed to
apache, which is more oriented to serving pages). 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4439964</link><pubDate>Fri, 12 Apr 2019 17:48:20 -0000</pubDate><title>Re: citadel redirect http (80) to https (443)</title><guid isPermaLink="false">4439964@Uncensored</guid><description><![CDATA[Right.  WebCit itself won't do the redirect.  You can run some other web server
on port 80 and do the redirect to WebCit from there. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4439929</link><pubDate>Fri, 12 Apr 2019 15:10:11 -0000</pubDate><title>Re: citadel redirect http (80) to https (443)</title><guid isPermaLink="false">4439929@Uncensored</guid><description><![CDATA[<html><body>

<p> </p>
<blockquote>
<div class="message_header"><span>Fri Apr 12 2019 10:53:32 EDT</span> <span>from simon2371 @ Uncensored </span> <span class="message_subject">Subject: citadel redirect http (80) to https (443)</span></div>
<div class="message_content">
<p>Is there a way to force https on Citadel? Thanks.</p>
</div>
</blockquote>
<p>Yup...disable port 80 in webcit and only publish links to https/443.</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4439920</link><pubDate>Fri, 12 Apr 2019 14:53:32 -0000</pubDate><title>citadel redirect http (80) to https (443)</title><guid isPermaLink="false">4439920@Uncensored</guid><description><![CDATA[<html><body>

<p>Is there a way to force https on Citadel? Thanks.</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4412468</link><pubDate>Thu, 10 Jan 2019 22:40:27 -0000</pubDate><title>Message #4412468</title><guid isPermaLink="false">4412468@Uncensored</guid><description><![CDATA[I was going to say have no lines going in or going out. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4412451</link><pubDate>Thu, 10 Jan 2019 21:38:18 -0000</pubDate><title>Message #4412451</title><guid isPermaLink="false">4412451@Uncensored</guid><description><![CDATA[I have a much dimmer view of encryption in general: any encryption that is
legal, can be broken in real time by The Bad People. 
  
 "You have no privacy.  Get over it."  -- Scott McNealy 
  
 These days, if you really and truly need to guard access into a system, you
have to use two-factor authentication.  And even then, The Bad People are
still watching.  I like ricin my burritos. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4412040</link><pubDate>Wed, 09 Jan 2019 18:25:29 -0000</pubDate><title>Message #4412040</title><guid isPermaLink="false">4412040@Uncensored</guid><description><![CDATA[  
 Heh... until the day someone figures out how to defeat that. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4412037</link><pubDate>Wed, 09 Jan 2019 18:19:29 -0000</pubDate><title>Message #4412037</title><guid isPermaLink="false">4412037@Uncensored</guid><description><![CDATA[I'd rather see SASL die.  It has a million zillion ways to avoid sending a
password in the clear, and they're ALL obsolete if the connection itself is
encrypted. 
  
 Plain authentication over TLS for the win. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4409713</link><pubDate>Wed, 02 Jan 2019 14:40:12 -0000</pubDate><title>Message #4409713</title><guid isPermaLink="false">4409713@Uncensored</guid><description><![CDATA[  
 Eh... but that appears to be the standard lately.  Force people to use such-and-so
specific encryption standard, and fuck them in the eye sockets if they won't.

]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4405073</link><pubDate>Tue, 18 Dec 2018 22:59:13 -0000</pubDate><title>Message #4405073</title><guid isPermaLink="false">4405073@Uncensored</guid><description><![CDATA[ >And I'd like to ask, what do you think in general?  
 >In the case you think as well only one port would be enough, which  
 >case would you prefer to stay for good? The more recent TLS implicit  
 >ports, or the old ports just with STARTTLS?   
  
 Actually, I think encryption in general is a bad idea, because it lulls people
into a false sense of security. 
  
 One port or two ports is fine; instead I take issue with software that tries
to enforce some sort of encryption policy and doesn't allow the user to override
it.  Yes, sometimes I want to send a password in the clear, and if I'm ok
with that, the software shouldn't try to tell me I can't. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4396195</link><pubDate>Sat, 17 Nov 2018 17:30:04 -0000</pubDate><title>Message #4396195</title><guid isPermaLink="false">4396195@Uncensored</guid><description><![CDATA[ >I was really good at getting serial stuff to work....  So many people  

 >that it was magic.   
  
 Well yes, if you understood the protocol instead of just guessing, like a
lot of people did ... it wasn't *that* hard.  As long as you had the tools.

  
 Of course, RS-232 was for pussies.  Real engineers used V.35, with those
gigantic 34-pin Winchester connectors.  Yeah! 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4391421</link><pubDate>Fri, 02 Nov 2018 18:44:24 -0000</pubDate><title>Message #4391421</title><guid isPermaLink="false">4391421@Uncensored</guid><description><![CDATA[  
 I also remember the different file formats for text. 
  
 Amusingly, that hasn't changed.  If anything, it has only grown worse over
time. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4391099</link><pubDate>Fri, 02 Nov 2018 01:44:45 -0000</pubDate><title>Message #4391099</title><guid isPermaLink="false">4391099@Uncensored</guid><description><![CDATA[I was really good at getting serial stuff to work....  So many people that
it was magic. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4391023</link><pubDate>Thu, 01 Nov 2018 16:46:19 -0000</pubDate><title>Message #4391023</title><guid isPermaLink="false">4391023@Uncensored</guid><description><![CDATA[Seriously.  Anyone who worked with computers back then will remember what
a nightmare it was to get different types of devices to handshake properly.
 Every printer vendor had slightly different requirements.  I did my share
of time with the breakout box.  I don't miss that. 
  
 DigiBoard (now just "Digi") is still around, by the way.  They seem to do
a lot of stuff with mobile routers. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4390192</link><pubDate>Mon, 29 Oct 2018 19:12:46 -0000</pubDate><title>Message #4390192</title><guid isPermaLink="false">4390192@Uncensored</guid><description><![CDATA[<html><body>

<p>So I just read this:<br />https://www.fastmail.com/help/technical/ssltlsstarttls.html</p>
<p>Quite helped me to understand the differences, but one of the parts that caught my attention was this:<br />"At some point, it was decided that having 2 ports for every protocol was wasteful, and instead you should have 1 port that starts off as plaintext, but the client can upgrade the connection to an SSL/TLS encrypted one. This is what STARTTLS was created to do."</p>
<p>In my particular case, I also think it'd be better to go back having only one port for each protocol. But, from what I could overall understand, they still cannot reach a "global" agreement, old software is too conservative, etc, etc, which has the effect of keeping more than one port for each protocol for good...</p>
<p>And I'd like to ask, what do you think in general?<br />In the case you think as well only one port would be enough, which case would you prefer to stay for good? The more recent TLS implicit ports, or the old ports just with STARTTLS?</p>
<p>Thanks again.</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4389174</link><pubDate>Fri, 26 Oct 2018 14:13:22 -0000</pubDate><title>Message #4389174</title><guid isPermaLink="false">4389174@Uncensored</guid><description><![CDATA[  
 That would have simplified quite a few things if people followed that standard.
 Hm. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4388941</link><pubDate>Fri, 26 Oct 2018 00:11:49 -0000</pubDate><title>Message #4388941</title><guid isPermaLink="false">4388941@Uncensored</guid><description><![CDATA[ > Heh... imagine if RS-232 connectors could have a conflict between     
 >their physical gender and what they feel their physical gender should  
  
 >have been.       
    
  
 (Quoted from fleeb in the Home Handyman room) 
  
 I know it was a joke, but ... RS-232 connectors originally *did* have "gender
roles". 
  
 RS-232 on a male DB-25 connector was supposed to behave as DTE, with transmit
on pin 2, receive on pin 3, asserting DTR on pin 20, etc. 
  
 RS-232 on a female DB-25 connector was supposed to behave as DCE, receiving
on pin 2, transmitting on pin 3, listening for DTR on pin 20, etc. 
  
 In practice, most manufacturers simply put female connectors on everything,
shipped male-to-male cables, and expected you to work out any connection problems
on your own.  Ironically, one notable exception was IBM, the "evil empire"
of that era, whose DTE ports on the PC were 25 pin male.
 Imagine that, the manufacturer who at the time was famous for coming up with
their own incompatible version of everything, was one of the few following
the standard. 
  
 If everyone had followed the standard, an entire category of adapters would
not have been needed. 
  
 Today, over half a century after RS-232 was introduced, most serial ports
appear as the de-facto standard of the Cisco serial console pinouts on an
RJ-45 connector. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4374156</link><pubDate>Mon, 03 Sep 2018 22:02:38 -0000</pubDate><title>Message #4374156</title><guid isPermaLink="false">4374156@Uncensored</guid><description><![CDATA[Well, if one is running a mail server with SSL encrypted POP/IMAP/SMTP, there
shouldn't be any additional security implications, just a much busier spam
filter as IG pointed out.  Spammers rely on replies from mail servers to see
how far they can get in terms of information gathering.  An open relay could
reveal a lot more than novices would be aware of, presuming that this was
something that all ISp's adopted.  I've worked with enough "senior technical"
personnel to know that far too many either lied or conned their way into their
jobs with either minimal or no actual expertise.  No wonder big corporations
are going bankrupt...something for another room, though.  :) 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4373474</link><pubDate>Thu, 30 Aug 2018 15:12:23 -0000</pubDate><title>Message #4373474</title><guid isPermaLink="false">4373474@Uncensored</guid><description><![CDATA[Having a bang path for email requires that everyone has to be an open relay.
 So I doubt the spam level would change to anything other than MUCH more.

]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4373390</link><pubDate>Thu, 30 Aug 2018 03:25:27 -0000</pubDate><title>Message #4373390</title><guid isPermaLink="false">4373390@Uncensored</guid><description><![CDATA[<html><body>

<p>I still kinda miss having a bang path for email.  I imagine less spam would result if we went back to using that routing.</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4372899</link><pubDate>Mon, 27 Aug 2018 14:15:24 -0000</pubDate><title>Message #4372899</title><guid isPermaLink="false">4372899@Uncensored</guid><description><![CDATA[I wonder if Tom Jennings and the other minds around FIDOnet were modeling
their own limited addressing after that inadvertedly - i.e. 1:282/101 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4372446</link><pubDate>Fri, 24 Aug 2018 20:46:30 -0000</pubDate><title>Message #4372446</title><guid isPermaLink="false">4372446@Uncensored</guid><description><![CDATA[Well yes, the history of the ARPAnet is fairly well documented, and if you
dig enough, you'll learn that they had a network-wide "flag day" on 1983-jan-01
where the whole network switched its layer 3 protocol from NCP to IP. 
  
 Unfortunately I haven't been able to find much documentation regarding what
NCP actually looked like.  I know the addresses were smaller, that's about
it. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4372003</link><pubDate>Wed, 22 Aug 2018 19:24:17 -0000</pubDate><title>Message #4372003</title><guid isPermaLink="false">4372003@Uncensored</guid><description><![CDATA[Those of us that used to love the joys of early DNS configurations...   
    
 zzzz.yyyy.xxxx.in-addr.arpa   
    
  
 And then chose to investigate why we had to use that reference, since we
were civilians.  :) 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4371834</link><pubDate>Wed, 22 Aug 2018 01:09:42 -0000</pubDate><title>Message #4371834</title><guid isPermaLink="false">4371834@Uncensored</guid><description><![CDATA[How many people today know anything about arpa or IMP's? 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4371804</link><pubDate>Tue, 21 Aug 2018 21:50:26 -0000</pubDate><title>Message #4371804</title><guid isPermaLink="false">4371804@Uncensored</guid><description><![CDATA[<html><body>

<p>People might notice but not say anything.</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4371787</link><pubDate>Tue, 21 Aug 2018 20:31:51 -0000</pubDate><title>Message #4371787</title><guid isPermaLink="false">4371787@Uncensored</guid><description><![CDATA[I wrote on my whiteboard in red ink: "NCP to IP conversion - finish by 1983-jan-01"

  
 Let's see who notices. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4356032</link><pubDate>Wed, 06 Jun 2018 15:36:33 -0000</pubDate><title>Message #4356032</title><guid isPermaLink="false">4356032@Uncensored</guid><description><![CDATA[...which makes it very easy to use tactical localized blasts to take out just
the parts of the Internet which are problematic. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4353037</link><pubDate>Mon, 21 May 2018 12:14:51 -0000</pubDate><title>Message #4353037</title><guid isPermaLink="false">4353037@Uncensored</guid><description><![CDATA[  
 Heh... if I have the right memory of this, the DoD's involvement nearly forced
the internet to be chaotic in this way, to address a concern that it be capable
of withstanding a nuclear blast. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4352547</link><pubDate>Fri, 18 May 2018 17:30:51 -0000</pubDate><title>Message #4352547</title><guid isPermaLink="false">4352547@Uncensored</guid><description><![CDATA[I'm thinking that if the People Who Wield Too Much Power were designing the
Internet today, they'd build it with supervision built into the network layer,
like Fibre Channel.  The closest they can get to supervision today is by wielding
power over DNS, and of course by eavesdropping.  The PWWTMP wouldn't have
built an Internet that "interprets censorship as damage and routes around
it" -- they would have built an Internet that could force censorship down
the entire stack, across the entire network, at the touch of a button.  It
would be hierarchial, not distributed. 
  
 One could argue that the reason the Internet became not only popular, but
pervasive, is because it was *not* designed this way..  The hierarchial supervised
network is, without question, what people like Al Gore had in mind when they
declared that they wanted to build an "information superhighway".  Later they
took credit for the Internet, but they did not build the Internet. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4352323</link><pubDate>Thu, 17 May 2018 18:40:21 -0000</pubDate><title>Message #4352323</title><guid isPermaLink="false">4352323@Uncensored</guid><description><![CDATA[I'm pretty confused by this.  Today's Internet is wrapped up tighter than
a canoli, and while it's possible to have toy or island networks of your own,
they don't make a dent in the grand scheme of connectivity.  Named Data Networking
seems no more nor no less centralized than IP, but your response seems to
suggest it's more controllable.  Am I misunderstanding something? 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4352121</link><pubDate>Wed, 16 May 2018 17:50:57 -0000</pubDate><title>Message #4352121</title><guid isPermaLink="false">4352121@Uncensored</guid><description><![CDATA[Today's titans wouldn't build the Internet the way it exists today; they'd
definitely build it in a way that is more centrally controllable.  We got
lucky with this one. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4352106</link><pubDate>Wed, 16 May 2018 17:16:35 -0000</pubDate><title>Message #4352106</title><guid isPermaLink="false">4352106@Uncensored</guid><description><![CDATA[If I were serious about that, I'd be advocating for content-addressed or data-driven
networking (whatever that thing Van Jacobson was working on is called today).

]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4351772</link><pubDate>Mon, 14 May 2018 18:06:36 -0000</pubDate><title>Message #4351772</title><guid isPermaLink="false">4351772@Uncensored</guid><description><![CDATA[  
 Heh... IPX/SPX... 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4351745</link><pubDate>Mon, 14 May 2018 15:44:33 -0000</pubDate><title>Message #4351745</title><guid isPermaLink="false">4351745@Uncensored</guid><description><![CDATA[Banyan Vines?  XNS?  Apollo Domain?  DECnet?  AppleTalk?  SNA?  Why should
IP get the global network all to itself? 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4347065</link><pubDate>Mon, 23 Apr 2018 17:13:23 -0000</pubDate><title>Message #4347065</title><guid isPermaLink="false">4347065@Uncensored</guid><description><![CDATA[I wish you the best of luck! 
  
 (slinks off to invent a new internetwork of his own....) 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4346190</link><pubDate>Tue, 17 Apr 2018 23:39:57 -0000</pubDate><title>Message #4346190</title><guid isPermaLink="false">4346190@Uncensored</guid><description><![CDATA[  
 I'm going to Cisco Live this year.  Should be fun.  Hopefully I can meet
the right people and learn the right technologies to build a way for me to
personally control the entire Internet.  Nobody on the planet is more deserving
of that privilege than I am. 
  
 It's been a long time since I've been to an industry conference.  I'm excited.

]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4337696</link><pubDate>Sun, 25 Feb 2018 22:23:33 -0000</pubDate><title>Message #4337696</title><guid isPermaLink="false">4337696@Uncensored</guid><description><![CDATA[<html><body>

<p>When IPv6 first started showing up, and was slow to be deployed, I often said that they should have just made IP addresses variable-length, and simply stick with 32-bit addresses until we got to a point where everyone was upgraded to new software.  Then we could start using longer addresses.  I envisioned an Internet where addresses were hierarchial, so if for example you had an address 169.254.0.1, you would automatically be routed addresses below it, such as 169.254.0.1.1, 169.254.0.1.2, 169.254.0.1.3, etc, and then the node at 169.254.0.1.3 would also automatically become the router for 169.254.0.1.3.1, 169.254.0.0.3.2, etc.</p>
<p>Yes, I am smarter than the entire IETF, but we're stuck with their design now.</p>
<p>Well, it turns out that I'm not the only one who thought this way.  Here's an undated piece [ <a href="http://mercury.lcs.mit.edu/~jnc/tech/book3.html">http://mercury.lcs.mit.edu/~jnc/tech/book3.html</a> ] from none other than J. Noel Chiappa, who proposed pretty much exactly the same thing.  I don't know when he wrote this, because very little of the material on his web site is dated, but it's a good bit of thinking.  SNMP and LDAP use hierarchies like this, with absolutely smashing success: no one person or organization ever needs to be assigned more than one node in the tree, because they can just keep carving it up forever.</p>
<p>(For those who don't know who J. Noel Chiappa is -- he is one of the great unsung pioneers of the Internet.  He invented the router.)</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4291217</link><pubDate>Wed, 06 Sep 2017 17:09:46 -0000</pubDate><title>Message #4291217</title><guid isPermaLink="false">4291217@Uncensored</guid><description><![CDATA[<html><body>

<p>Actually you have a port on an OLT running at 622 Mbps downstream, 155 Mbps upstream, shared by up to 32 subscribers using optical splitters.  At least that's how it is on my circuit which is wired for BPON.  Some of them are getting upgraded to GPON which is 2.4 Gbps downstream, 1.2 Gbps upstream, shared by up to 64 subscribers using optical splitters, and the wire protocol is Ethernet instead of ATM.  (Telcos took a long time to realize that no one cares about ATM anymore except for them.)</p>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4291144</link><pubDate>Wed, 06 Sep 2017 04:17:21 -0000</pubDate><title>Message #4291144</title><guid isPermaLink="false">4291144@Uncensored</guid><description><![CDATA[With FiOS, you get an entire switch port all to yourself.  Until the switch
gets overprovisioned, just like our DSLAMs.  ;) 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4290941</link><pubDate>Mon, 04 Sep 2017 17:42:10 -0000</pubDate><title>Message #4290941</title><guid isPermaLink="false">4290941@Uncensored</guid><description><![CDATA[  
 "FiOS is not cable!  We're wired differently!" 
  
 (for now) 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4286671</link><pubDate>Mon, 07 Aug 2017 20:36:55 -0000</pubDate><title>Message #4286671</title><guid isPermaLink="false">4286671@Uncensored</guid><description><![CDATA[  
 Sounds like they're working well. :-D 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4286465</link><pubDate>Sat, 05 Aug 2017 19:17:54 -0000</pubDate><title>Message #4286465</title><guid isPermaLink="false">4286465@Uncensored</guid><description><![CDATA[<html><body>

<p>How those pain meds working?</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4286449</link><pubDate>Sat, 05 Aug 2017 16:39:27 -0000</pubDate><title>Message #4286449</title><guid isPermaLink="false">4286449@Uncensored</guid><description><![CDATA["We upped our bandwidth. Up yours!" 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4286364</link><pubDate>Fri, 04 Aug 2017 19:07:16 -0000</pubDate><title>Message #4286364</title><guid isPermaLink="false">4286364@Uncensored</guid><description><![CDATA[I'm in VoIP QoS hell today. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4217048</link><pubDate>Wed, 22 Mar 2017 16:37:40 -0000</pubDate><title>Message #4217048</title><guid isPermaLink="false">4217048@Uncensored</guid><description><![CDATA[Actually, Docker seems like the perfect way to distribute binary code across
a range of compatible operating systems, since it carries along any of the
libraries and other oddities that might vary from system to system. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4216736</link><pubDate>Tue, 21 Mar 2017 23:31:15 -0000</pubDate><title>Message #4216736</title><guid isPermaLink="false">4216736@Uncensored</guid><description><![CDATA[  
 what? docker is a binary image format. it's *not* source-based. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4216291</link><pubDate>Mon, 20 Mar 2017 11:45:57 -0000</pubDate><title>Message #4216291</title><guid isPermaLink="false">4216291@Uncensored</guid><description><![CDATA[  
 We've considered the use of Docker for a different purpose... putting an
arbitrary number of these things on one box, and forwarding from one to all
of them simultaneously. 
  
 Sadly, though, we can't distribute this as a Docker image, as we can't let
people have access to the code.  If we were open-sourced, it wouldn't be a
problem. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4206724</link><pubDate>Mon, 06 Mar 2017 14:58:40 -0000</pubDate><title>Message #4206724</title><guid isPermaLink="false">4206724@Uncensored</guid><description><![CDATA[  
 depends on who's wisdom your listening to. that's certainly the latest trend.

  
 too many public docker base-images have unpatched security holes. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4206693</link><pubDate>Mon, 06 Mar 2017 13:30:03 -0000</pubDate><title>Message #4206693</title><guid isPermaLink="false">4206693@Uncensored</guid><description><![CDATA[<html><body>

<p>The current wisdom seems to be that you should distribute your appliance as a Docker container.</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4203609</link><pubDate>Tue, 28 Feb 2017 19:16:47 -0000</pubDate><title>Message #4203609</title><guid isPermaLink="false">4203609@Uncensored</guid><description><![CDATA[  
 This appliance interfaces via web (both for a UI and services). 
  
 I just figured using forwarded ports would work more easily than having to
reconfigure a web server, but it seems I am wrong. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4203382</link><pubDate>Tue, 28 Feb 2017 14:20:10 -0000</pubDate><title>Message #4203382</title><guid isPermaLink="false">4203382@Uncensored</guid><description><![CDATA[<html><body>

<p>It is not uncommon to distribute an appliance with a front end web server installed to handle proxy, caching, security, and even connection pooling.</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4200551</link><pubDate>Wed, 22 Feb 2017 19:00:24 -0000</pubDate><title>Message #4200551</title><guid isPermaLink="false">4200551@Uncensored</guid><description><![CDATA[  
 It's a trifle annoying, though, having to handle two configuration files
instead of one, but, eh... whatever. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4200245</link><pubDate>Wed, 22 Feb 2017 03:43:36 -0000</pubDate><title>Message #4200245</title><guid isPermaLink="false">4200245@Uncensored</guid><description><![CDATA[<html><body>

<p>Sanity...</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4199920</link><pubDate>Tue, 21 Feb 2017 12:44:11 -0000</pubDate><title>Message #4199920</title><guid isPermaLink="false">4199920@Uncensored</guid><description><![CDATA[  
 Huh... actually, apache2 does support doing exactly what I want. 
  
 I have to modify two files to do it instead of just one, but it is possible
to specify multiple ip/port combinations for a single <VirtualHost>. 
  
 You can also mess around with ipv6. 
  
 This is probably the most straightforward way to address this problem. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4199903</link><pubDate>Tue, 21 Feb 2017 11:56:49 -0000</pubDate><title>Message #4199903</title><guid isPermaLink="false">4199903@Uncensored</guid><description><![CDATA[  
 In this situation, the person gains a full virtual machine that they can
alter with as many network adapters configured however they want. 
  
 The people who would use this product might have unusual security conditions
that may require peculiar network environments.  If I can provide a flexible
environment that lets them connect to the product however they wish (whatever
port they want, etc), then the product becomes more appealing to them. 
  
 The only possible problem with stunnel is that it forces SSL.  But, we force
it anyway, so I don't view that as a serious impediment; we don't really want
this information openly viewable via wireshark or the like. 
  
 I can indeed tell apache2 to listen to specific ports and specific adapters,
but I don't know how well it listens to multiple ports/adapters configured
in wildly different ways (e.g. 10.1.0.41:9123 & 192.168.1.23:443).  Or, for
that matter, if it's relatively simple to program such configurations.  I
can research it, though. 
  
 Port forwarding just seemed like it would work easily via iptables, but considering
that stack overflow (or, as they call it now, superuser) has had a question
similar to this for 5 years left unanswered, perhaps this isn't as easy an
approach as I expected. 
  
 Hmm... nginx proxy... I can look at that, too. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4199817</link><pubDate>Mon, 20 Feb 2017 22:39:06 -0000</pubDate><title>Message #4199817</title><guid isPermaLink="false">4199817@Uncensored</guid><description><![CDATA[  
 I suppose we have to get this out of the way: why are you trying to tackle
this problem using port forwarding?  Most server programs can be told to listen
on a variety of interface:port combinations. 
  
 If you really must forward, and if the protocol being used is HTTP or HTTPS,
then maybe you could consider running an nginx proxy as a connection multiplexer.
 If you do that it can handle things like SSL offload for you as well. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4199787</link><pubDate>Mon, 20 Feb 2017 20:08:05 -0000</pubDate><title>Message #4199787</title><guid isPermaLink="false">4199787@Uncensored</guid><description><![CDATA[<html><body>

<p>I agree about the Static IP vs Dynamic. One other thing to consider is that every dynamic IP is on a block list if you plan on running a mail server, so expect for your messages to get rejected by at least half of the servers out there.</p>
<p> </p>
<p>Computers are much smarter at scanning than we are, but also, most of the time are just after the low lying fruit. Port knocking does have a way of thwarting them, when combined with firewall rules which denote which IP addresses the connection requests can come from, etc.</p>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4199782</link><pubDate>Mon, 20 Feb 2017 20:02:07 -0000</pubDate><title>Message #4199782</title><guid isPermaLink="false">4199782@Uncensored</guid><description><![CDATA[<html><body>

<p>One other thought I had, which I use often is to do those types of translations at the router level. I guess to give a proper answer, I would need to know more about the environment (like why not just set your apache to listen on 8443 if it is security through obscurity?) also, If it is your local network access which you are concerned with or just outside connections. Those things make a difference with what method you use. You can get really technical and set up an stunnel listener on the 8443 and have it route to localhost (either directly, or through some fancy /etc/hosts file entries ) to your 443 port.</p>
<p> </p>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4199781</link><pubDate>Mon, 20 Feb 2017 19:50:00 -0000</pubDate><title>Message #4199781</title><guid isPermaLink="false">4199781@Uncensored</guid><description><![CDATA[  
 I might need to do something like that. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4199768</link><pubDate>Mon, 20 Feb 2017 19:25:49 -0000</pubDate><title>Message #4199768</title><guid isPermaLink="false">4199768@Uncensored</guid><description><![CDATA[<html><body>

<p>Fleeb,</p>
<p>we in the past have used something like stunnel to route between ports. YMMV.</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4199762</link><pubDate>Mon, 20 Feb 2017 18:53:42 -0000</pubDate><title>Message #4199762</title><guid isPermaLink="false">4199762@Uncensored</guid><description><![CDATA[  
 Right. 
  
 I have kind of an annoying problem.  It's annoying because it looks like
it should be sooper easy, but instead, it has consumed a full day for me.

  
 I've posed it here: 
  
 http://superuser.com/questions/1180006/how-do-i-port-forward-from-adapter-to-localhost-changing-ports

  
 This said, I'm trying to use iptables to port-forward from a selection of
adaptes on a linux server to localhost.  The trick, though, is that the number
for the port doesn't necessarily match between localhost and the adapter.

  
 I plan to have apache2 running such that it is only accessible directly via
localhost, then to use iptables to open the pages to particular adapters on
specific ports (as a configuration option).  I want to take this approach
because I might use one port for one adapter, but a totally different port
on a different adapter. 
  
 Any ideas on how to do this?  Is iptables perhaps not the right tool, and
I need to do something funky with netcat instead? 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4136462</link><pubDate>Mon, 14 Nov 2016 22:25:23 -0000</pubDate><title>Message #4136462</title><guid isPermaLink="false">4136462@Uncensored</guid><description><![CDATA[<html><body>

<p>I have to admit that none of my clients has a static IP, all of them use some dynamic dns service. Some might have an isp contract with an opt-in option, but for some unrational gut-feeling I have never applied for a static IP in their name. For security feelings. Since you can't call that a reason. :)</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4136405</link><pubDate>Mon, 14 Nov 2016 19:00:30 -0000</pubDate><title>Message #4136405</title><guid isPermaLink="false">4136405@Uncensored</guid><description><![CDATA[<html><body>

<p>Thanks guys, sage advice i think: that is why i asked here.</p>
<p>I told one of my oldest friends who is a network engineer (he's between contracts if anyone needs a good man to maintain their network in the UK/London area - or anywhere else?? ;) ), a while back, and he said that a fixed IP might be a bad idea. I however have as my first point of call, on setting up a home network, a book by Roderick W Smith "Linux Networking for your Office, as my introduction to networking (along with his book on broadband internet for home users), </p>
<p>( https://www.amazon.com/exec/obidos/ASIN/0672317923/roderwsmithshome</p>
<p>and</p>
<p>https://www.amazon.com/exec/obidos/ASIN/0201738279/roderwsmithshome )</p>
<p>and the advice he gives is, dynamic or fixed IP both have similar security risks so use whatever method. So </p>
<p>I have used my fixed IP to run a gopher server, as a test - so port 70 is not blocked by my ISP ( i used PyGopherd,  written by John Goerzen, who frequents this board ).</p>
<p>Hopefully citadel's default port (504 ?) is not blocked.</p>
<p>I'll stick with the static IP for convenience sake, and read up on securing my system then.</p>
<p> </p>
<p> </p>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4136261</link><pubDate>Mon, 14 Nov 2016 12:29:34 -0000</pubDate><title>Message #4136261</title><guid isPermaLink="false">4136261@Uncensored</guid><description><![CDATA[  
 I don't have anything to add to that, beyond, 'Ditto'. 
  
 I don't think there's enough of a difference between dynamic and static IP
addresses, security-wise, to warrant the inconvenience. 
  
 From there, embrace your paranoia as far as you wish to go. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4136115</link><pubDate>Sun, 13 Nov 2016 04:02:44 -0000</pubDate><title>Re: Net Fu</title><guid isPermaLink="false">4136115@Uncensored</guid><description><![CDATA[Yeah.  the_mgt pretty much summed it up.  Static IP makes it way easier for
authorized users to find your server, but the badguys will find it either
way, so if it makes your life easier, go for it.  Make sure, though, that
if you're going to pay extra for a static IP address, that they don't block
the incoming ports you want to use. 
  
 I ran Uncensored on a home server with a static IP address for 11 years.
 I don't think we ever had an attack that would have been preventable by having
a dynamic IP address.  That's what proper firewalls and other good security
practices are for. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4135974</link><pubDate>Sat, 12 Nov 2016 10:18:25 -0000</pubDate><title>Message #4135974</title><guid isPermaLink="false">4135974@Uncensored</guid><description><![CDATA[<html><body>

<p>Not having a static IP at home is just security by obscurity.</p>
<p>Especially since you say that you want to run some services. If you do so, you need a method to access the dynamic IP, which is done most of the time by using a dynamic DNS service, such as dyndns.org (a big no no!) or afraid.org (they are cool) or others. That means, your home is reachable via that dynamic address and the bots and assholes are ready to fire.</p>
<p>Then there are the servers you reach from your dynamic IP address. For example, people could read the "Online users" list here regularly and will always be able to attack user Mo under his address. Connection to an IRC network? Yet another source.</p>
<p>I run a server at home for over 10 years now and the logs always show various degrees of connection attempts from strangers. Therefore, the usual measures apply:</p>
<p>Keep your system up to date, especially after you hear about sever faults in some software, the kernel or maybe even your modem/router hardware.</p>
<p>Use fail2ban or denyhosts for the services that are open on the net, apply some simple iptables rules that ban people who connect to fast. (You will shoot yourself in the foot at least once with these countermeasures!)</p>
<p>If you must connect home, think about using VPN. Have everything reachable only by connecting through VPN. That might make it harder for friends to reach your FTP server, but it decreases the attackable surface.</p>
<p>That is the bare minimum, everything else can be done according to your degree of paranoia.</p>
<p>There are also tips like "use port knocking" or "change the default port". As if a computer would not be able to scan every open port on your system either rapidly or slowly. Look at what nmap can do in various degrees of aggressiveness and then think again if changing your ssh port to 2222 is a smart move. </p>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4135956</link><pubDate>Sat, 12 Nov 2016 06:20:12 -0000</pubDate><title>Net Fu</title><guid isPermaLink="false">4135956@Uncensored</guid><description><![CDATA[<html><body>

<p>Hi, i think i am in the right place here, after ready that last bit of net-voodoo (fu to you, voodoo to me ;) ). So, i have a question:</p>
<p>What are the pros and cons of having, a fixed IP address, so i can access my files and run a couple of server from home?</p>
<p>I have a friend in the biz 30 years said it's a big no-no, not secure having one static IP. But have read there is not much difference security wise between this and a dynamic address.</p>
<p>Any thoughts on securing a static IP?</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4124581</link><pubDate>Thu, 06 Oct 2016 11:13:43 -0000</pubDate><title>Message #4124581</title><guid isPermaLink="false">4124581@Uncensored</guid><description><![CDATA[  
 Damn, but that's subtle.  Good work. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4124490</link><pubDate>Thu, 06 Oct 2016 00:07:07 -0000</pubDate><title>Message #4124490</title><guid isPermaLink="false">4124490@Uncensored</guid><description><![CDATA[You're supposed to be praising my net-fu, not the Fortinets.  But yeah, they're
pretty cool.  They take some time to get used to.  But they present a more
rigid configuration model that I think forces you to build better networks.

]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4123732</link><pubDate>Wed, 05 Oct 2016 02:31:52 -0000</pubDate><title>Message #4123732</title><guid isPermaLink="false">4123732@Uncensored</guid><description><![CDATA[I started using Fortinet's a couple of years ago.  They rock.   
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4123729</link><pubDate>Wed, 05 Oct 2016 02:09:31 -0000</pubDate><title>Message #4123729</title><guid isPermaLink="false">4123729@Uncensored</guid><description><![CDATA[omg, this was such a frustrating problem, but the solution was so interesting
I've got to share it. 
  
 We replaced a Cisco 2811 router with a Fortigate 240D.  It handles routing
between a number of IP networks at a site, with one handoff to a WAN.  In
the not too distant future it'll replace the site's Internet firewall as well,
but that hasn't been done yet. 
  
 Complaint received the next day: the network staff can't reach about a dozen
Cisco ethernet switches at their admin addresses.  The switches are carrying
layer 2 traffic just fine, so there isn't any outage, but the switches can't
be reached for maintenance.  Interestingly, they are still reachable when
we go to another device on the same subnet and ping or ssh over to them. 
  
 "It's all the switches in building XX," they said.  Nope, I found switches
in building YY that are unreachable, and switches in building XX that are
reachable. 
  
 "The Fortigate can't handle multinetted interfaces properly," they said.
 (Yes, that interface was multinetted; the reason is legit but irrelevant.)
 Well, I was willing to believe that, but couldn't prove it, since *most*
of the things on there were working. 
  
 IP address conflict?  Nope.  Checked that.   MAC address conflict?  Nope.

  
 While trying to figure out WTF, I changed the IP addresses of one of the
problem devices to an address on the router interface's primary address, thinking
it was a problem with that.  Didn't fix it.  But then the NOC said the device
started alerting in monitoring.  What?  How was it working in monitoring when
it wasn't working anywhere else? 
  
 I got a packet trace going on the Fortigate.  (Note: Fortinet's on-router
sniffer BLOWS AWAY anything Cisco has.)  Got a continuous ping going from
my laptop to the device in question.  And I
see the device issuing ARP requests for hosts that are *not* on its local
management network.  Again ... WTF?!?  Then ... since I'm so old-skool, I
noticed that these requests were only being issued for hosts on the SAME CLASSFUL
NETWORK (10.x.x.x). 
  
 So I stared at the configuration some more.  And then it hit me: 
  
     ip route 0.0.0.0 0.0.0.0 10.xxx.xxx.xxx 
  
 The specified gateway was correct ... but this statement wasn't doing a damn
thing.  It wasn't working.  And it had *never* worked.  I changed it to: 
  
     ip default-gateway 10.xxx.xxx.xxx 
  
 And ... BOOM.  Reachable from everywhere.  So why was the device reachable
before we changed the upstream router? 
  
 The device is a Catalyst 3750.  I went down the list, and found that every
unreachable device was a 3750, and they all had "ip route 0.0.0.0 0.0.0.0
10.x.x.x" statements.  That's how you set the default gateway
when the device is running in Layer 3 routing mode.  These aren't.  When IP
is only used for management, you have to use the "ip default-gateway 10.x.x.x"
command.  So again, why was it working before? 
  
 There is ancient code in the IOS IP stack, which makes it try things like
ARP and CDP to find a way off the local network when the default gateway is
not specified.  The old Cisco router was answering those requests and supplying
us with the default gateway.  Like I said, the "ip route" command was there,
but it wasn't being honored.  It was working for the wrong reason. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4116792</link><pubDate>Wed, 14 Sep 2016 14:26:09 -0000</pubDate><title>Message #4116792</title><guid isPermaLink="false">4116792@Uncensored</guid><description><![CDATA[  
 DS-NAT.  Punching is straightforward, unless you plan to use a right hook.

]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4115383</link><pubDate>Mon, 12 Sep 2016 18:15:07 -0000</pubDate><title>Message #4115383</title><guid isPermaLink="false">4115383@Uncensored</guid><description><![CDATA[  
 The punching or the DS-NAT? 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4115366</link><pubDate>Mon, 12 Sep 2016 17:32:34 -0000</pubDate><title>Message #4115366</title><guid isPermaLink="false">4115366@Uncensored</guid><description><![CDATA[  
 Hmmmm... tricky... 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4109706</link><pubDate>Fri, 02 Sep 2016 14:50:06 -0000</pubDate><title>Message #4109706</title><guid isPermaLink="false">4109706@Uncensored</guid><description><![CDATA[  
 Use the auto-recombobulator with transparent bidirectional DS-NAT. And then
punch the dumb fuck in the face. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4109684</link><pubDate>Fri, 02 Sep 2016 13:41:15 -0000</pubDate><title>Message #4109684</title><guid isPermaLink="false">4109684@Uncensored</guid><description><![CDATA[    
 OMG.   
    
 Someone just asked me what route metrics to use to get hosts on a 192.168.60.0/24
network talking over a VPN to hosts on a remote 192.168.60.0/24 network. 
 
  
  
 The labor day weekend drinking is going to have to start early, I think.

]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4097991</link><pubDate>Thu, 04 Aug 2016 07:50:54 -0000</pubDate><title>Message #4097991</title><guid isPermaLink="false">4097991@Uncensored</guid><description><![CDATA[  
 I've seen it used successfully in a class before.  It gave me a double-take,
as it isn't very conventional. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4097051</link><pubDate>Wed, 03 Aug 2016 13:23:57 -0000</pubDate><title>Message #4097051</title><guid isPermaLink="false">4097051@Uncensored</guid><description><![CDATA[  
 Well I was actually just issuing some dry humor there, but now I'm going
to have to try using .0 and see if it works. 
  
 Of course, if you want to confuse the heck out of people, use .0 or .255
in a network that's bigger than /24.  For example, 172.16.1.0/23 or 172.16.0.255/23.
 That'll quickly call out the people who don't know how to think in CIDR and
only understand octets.  (ProTip: these are the same dweebs who still refer
to a /24 network as "a Class C," particularly when they are requesting /24
of public IPv4 space for their rack of three servers.  Not gonna happen in
2016.) 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4096852</link><pubDate>Wed, 03 Aug 2016 09:01:00 -0000</pubDate><title>Message #4096852</title><guid isPermaLink="false">4096852@Uncensored</guid><description><![CDATA[ >really was unusable under older TCP/IP stacks.   
  
 I'm talking MS-DOS era stuff there, though, and probably weird third-party
crap at that. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4096851</link><pubDate>Wed, 03 Aug 2016 09:00:23 -0000</pubDate><title>Message #4096851</title><guid isPermaLink="false">4096851@Uncensored</guid><description><![CDATA[  
 That is what used to be called the "network address", and I think it really
was unusable under older TCP/IP stacks. 
  
 And I guess its use is deeply ingrained. We all still start numbering with
.1, and I hadn't given that a second thought in a long time. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=4095804</link><pubDate>Mon, 01 Aug 2016 19:26:36 -0000</pubDate><title>Message #4095804</title><guid isPermaLink="false">4095804@Uncensored</guid><description><![CDATA[  
 So does anyone still believe the myth that the base address of a subnet (such
as X.X.X.0 in a /24 network) is "unusable" ? 
  
 (Those of us who can see the fnords know that this is actually where the
government puts their snoopware server.) 
  
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=3975367</link><pubDate>Thu, 29 Oct 2015 21:44:47 -0000</pubDate><title>Message #3975367</title><guid isPermaLink="false">3975367@Uncensored</guid><description><![CDATA[Maybe they rebranded it?  HP bought Compaq in 2002, and you can find ProCurve
stuff going way before that.  For example, here's a ProCure manual dated 1999:
 http://whp-hou4.cold.extweb.hp.com/pub/networking/software/59692320.pdf 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=3974290</link><pubDate>Thu, 29 Oct 2015 12:27:05 -0000</pubDate><title>Message #3974290</title><guid isPermaLink="false">3974290@Uncensored</guid><description><![CDATA[<html><body>

<p>well, I guess you fail here:</p>
<p>http://www.idealo.de/preisvergleich/OffersOfProduct/499189_-procurve-switch-4202vl-72-compaq.html</p>
<p>procurve was a compaq product.</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=3973951</link><pubDate>Wed, 28 Oct 2015 17:52:13 -0000</pubDate><title>Message #3973951</title><guid isPermaLink="false">3973951@Uncensored</guid><description><![CDATA[I see the name 'Fiorina' and I think of a bland-tasting cereal. 
  
 But I'm pretty sure the ProCurve stuff pre-dates Compaq.  Compaq knew better
than to try to manufacture that stuff. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=3973809</link><pubDate>Wed, 28 Oct 2015 12:24:35 -0000</pubDate><title>Message #3973809</title><guid isPermaLink="false">3973809@Uncensored</guid><description><![CDATA[  
 I see the name 'Fiorina', and I think of the deadly sin of Wrath. 
  
 Appropriate?  Dunno.  I wouldn't let her near my company, though. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=3973626</link><pubDate>Wed, 28 Oct 2015 07:07:53 -0000</pubDate><title>Message #3973626</title><guid isPermaLink="false">3973626@Uncensored</guid><description><![CDATA[<html><body>

<p>I guess like the ProLiant ones, thats a heritage of Compaq.</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=3973604</link><pubDate>Wed, 28 Oct 2015 02:43:19 -0000</pubDate><title>Message #3973604</title><guid isPermaLink="false">3973604@Uncensored</guid><description><![CDATA[Can we blame Fiorina for the HP "ProCurve" line of networking equipment? 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=3966981</link><pubDate>Mon, 05 Oct 2015 18:16:09 -0000</pubDate><title>Message #3966981</title><guid isPermaLink="false">3966981@Uncensored</guid><description><![CDATA[  
 And then blame it on Fiorina. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=3966978</link><pubDate>Mon, 05 Oct 2015 18:14:52 -0000</pubDate><title>Message #3966978</title><guid isPermaLink="false">3966978@Uncensored</guid><description><![CDATA[  
 Just start announcing the prefix. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=3966868</link><pubDate>Mon, 05 Oct 2015 13:50:57 -0000</pubDate><title>Message #3966868</title><guid isPermaLink="false">3966868@Uncensored</guid><description><![CDATA[Hewlett-Packard has at least two /8 blocks.  We should go find some network
socialists to "redistribute" them.  :) 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=3966674</link><pubDate>Mon, 05 Oct 2015 03:40:04 -0000</pubDate><title>Message #3966674</title><guid isPermaLink="false">3966674@Uncensored</guid><description><![CDATA[<html><body>

<p> </p>
<blockquote>
<div class="message_header"><span>Thu Sep 24 2015 05:12:49 PM EDT</span> <span>from vince-q @ Cascade Lodge BBS </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY"><br />I can always get a bunch from the .ampr.org block.... <br />&lt;very evil grin&gt; <br />.ampr.org owns a full Class A block!!! <br />&lt;exceptionally evil grin&gt; <br /><br />--K2NE (k2ne.ampr.org among others...) </div>
</div>
</blockquote>
<p>Vince, you may pry my IPV4 ampr.org from my cold dead hands.  (And from my local address coordinator as well) - as he has the rest of them for this area.  Long live mirrorshades!</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=3965274</link><pubDate>Mon, 28 Sep 2015 19:12:32 -0000</pubDate><title>Message #3965274</title><guid isPermaLink="false">3965274@Uncensored</guid><description><![CDATA[Not necessarily.  Pretty much any existing JavaScript interpreter could be
made that way just by instantiating multiple instances. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=3965261</link><pubDate>Mon, 28 Sep 2015 17:34:40 -0000</pubDate><title>Message #3965261</title><guid isPermaLink="false">3965261@Uncensored</guid><description><![CDATA[<html><body>

<p>from the second line of my comment, I'd guess its its homegrown.</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=3965153</link><pubDate>Mon, 28 Sep 2015 13:20:14 -0000</pubDate><title>Message #3965153</title><guid isPermaLink="false">3965153@Uncensored</guid><description><![CDATA[So the extension language for nginx is now JavaScript.  I like that. 
  
 It's not clear whether he wrote a JavaScript interpreter or brought one in?

]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=3964471</link><pubDate>Fri, 25 Sep 2015 08:58:59 -0000</pubDate><title>Message #3964471</title><guid isPermaLink="false">3964471@Uncensored</guid><description><![CDATA[<html><body>

<p>hm...</p>
<p>https://www.nginx.com/blog/launching-nginscript-and-looking-ahead/</p>
<p>'We run a separate VM for each request, so there’s no need for garbage collection.'</p>
<p>well...</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=3964411</link><pubDate>Thu, 24 Sep 2015 21:12:49 -0000</pubDate><title>Message #3964411</title><guid isPermaLink="false">3964411@Uncensored</guid><description><![CDATA[ > 2015-09-24 10:27 from IGnatius T Foobar @uncnsrd (Uncensored)     
 >      
 > For those of you living in North America ... ARIN is now completely   
 
 >out of IPv4 addresses.     
 >      
 > [ http://www.theregister.co.uk/2015/09/24/arin_ipv4_interview_ipv6/ ] 
   
 >      
 > I'm hoping this will finally kick the IPv6 migration into reality.    

 >     
 >    
    
 I can always get a bunch from the .ampr.org block....   
 <very evil grin>   
 .ampr.org owns a full Class A block!!!   
 <exceptionally evil grin>   
  
 --K2NE (k2ne.ampr.org  among others...) 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=3964377</link><pubDate>Thu, 24 Sep 2015 17:27:28 -0000</pubDate><title>Message #3964377</title><guid isPermaLink="false">3964377@Uncensored</guid><description><![CDATA[  
 For those of you living in North America ... ARIN is now completely out of
IPv4 addresses. 
  
 [ http://www.theregister.co.uk/2015/09/24/arin_ipv4_interview_ipv6/ ] 
  
 I'm hoping this will finally kick the IPv6 migration into reality. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=3928315</link><pubDate>Tue, 26 May 2015 16:47:14 -0000</pubDate><title>Message #3928315</title><guid isPermaLink="false">3928315@Uncensored</guid><description><![CDATA[  
 Hey folks ... I apologize for taking several days to discover and delete
the inappropriately posted troll/rant by a Zimbra employee in this room. 
  
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=3822045</link><pubDate>Mon, 17 Nov 2014 20:26:12 -0000</pubDate><title>Message #3822045</title><guid isPermaLink="false">3822045@Uncensored</guid><description><![CDATA[Sounds like we had almost parallel experiences.  Too bad we didn't have the
means to collaborate back then. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=3820282</link><pubDate>Sun, 16 Nov 2014 07:39:35 -0000</pubDate><title>Message #3820282</title><guid isPermaLink="false">3820282@Uncensored</guid><description><![CDATA[ And therein lies most of the fun! My best learning experience to-date, in
the computer realm, was back in the '80s, learning C by hacking the original
Citadel CP/M code. HUGE amounts of fun and fits the "learning something new"
(to me) from the work of others. 
  
 And when I started serious work on the Citadel:K2NE project I knew "going
in" what was good and what was not-so... which made for much time saved. 
  
 Rabbit holes are not bad things. Sometimes you find treasure in them! 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=3820269</link><pubDate>Sun, 16 Nov 2014 06:50:26 -0000</pubDate><title>Message #3820269</title><guid isPermaLink="false">3820269@Uncensored</guid><description><![CDATA[<html><body>

<p>Vince,</p>
<p>Gotcha.  I know the feeling. Remodeling all of our bathrooms at home right now as well, so the ham stuff falls behind.  I don't begrudge you, or discount your posts.  I don't acknowledge all of the posts, but I do read them.  I keep them all as - "something  I  read somewhere, but know it can work" :-)</p>
<p>Good luck in the finding time to explore things realm.  The more time you find exploring someone else's discovery is more time for you,but sometimes leads down a bit of a rabbit hole! </p>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=3818245</link><pubDate>Thu, 13 Nov 2014 06:03:36 -0000</pubDate><title>Message #3818245</title><guid isPermaLink="false">3818245@Uncensored</guid><description><![CDATA[ Looks like fun. I've got a zillion ham projects going on here right now,
as I'm sure you can surmise from the QSO> room. The ham/ax.25/citadel stuff
would involve hardware I don't currently own (a TNC) and time I really don't
have - for about six months at least. 
  
 Antennas to build... and more! 
 http://k2ne.net 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=3818239</link><pubDate>Thu, 13 Nov 2014 05:43:49 -0000</pubDate><title>Message #3818239</title><guid isPermaLink="false">3818239@Uncensored</guid><description><![CDATA[<html><body>

<p>My old crap here:</p>
<p>http://penguinpackets.com/~kelly/kblog/projects</p>
<p>I don't guarantee anything.  If it breaks, you get to keep both halves!</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=3818238</link><pubDate>Thu, 13 Nov 2014 05:42:26 -0000</pubDate><title>Message #3818238</title><guid isPermaLink="false">3818238@Uncensored</guid><description><![CDATA[<html><body>

<p>Yes, ran it for a few years.  Another ham did it better in Fortran and I gave up maintaining my version.</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=3818235</link><pubDate>Thu, 13 Nov 2014 05:12:17 -0000</pubDate><title>Message #3818235</title><guid isPermaLink="false">3818235@Uncensored</guid><description><![CDATA[ Have you actually gotten it to work over the air yet? 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=3818227</link><pubDate>Thu, 13 Nov 2014 04:23:12 -0000</pubDate><title>Message #3818227</title><guid isPermaLink="false">3818227@Uncensored</guid><description><![CDATA[<html><body>

<p>The text client works o.k. with the node program under AX.25.  A bit of hacking on line endings needs to be done, but, otherwise it works.</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=3810187</link><pubDate>Wed, 05 Nov 2014 19:32:14 -0000</pubDate><title>Message #3810187</title><guid isPermaLink="false">3810187@Uncensored</guid><description><![CDATA[  
 Then it might have been 1988/89 when I was doing the Citadel thing in Japan...
I remember logging into something out here back then with the handle 'machine'.
 I couldn't make it a regular thing, but I managed to download some executables
for the Citadel 68k stuff in order to actually run it. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=3810119</link><pubDate>Wed, 05 Nov 2014 16:27:37 -0000</pubDate><title>Message #3810119</title><guid isPermaLink="false">3810119@Uncensored</guid><description><![CDATA[You wouldn't have known of it in 1987 because the site didn't even go online
on dialup until 1988.  And it wasn't until a few years later that the Internet
mail gateway was developed. 
  
 yeesh ... "netproc" was such a beast of a program.   
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=3810032</link><pubDate>Wed, 05 Nov 2014 13:46:26 -0000</pubDate><title>Message #3810032</title><guid isPermaLink="false">3810032@Uncensored</guid><description><![CDATA[  
 I wish I could have tapped into all of this in 1987/88, when I was running
Citadel 68k in Japan.  That would have been an expensive set of phone bills,
but might have been worthwhile. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=3809900</link><pubDate>Wed, 05 Nov 2014 05:53:23 -0000</pubDate><title>Message #3809900</title><guid isPermaLink="false">3809900@Uncensored</guid><description><![CDATA[ So basically, IG, you did what I did when the "minnesota in crowd" thought
me "unworthy" -- I made my OWN "in crowd", as did  you.  
  
 Honestly, though, your last msg is the *first* I ever heard of your mail
forwarding schema. Neat! Wish I'd known of it in 1987. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=3809825</link><pubDate>Tue, 04 Nov 2014 21:49:25 -0000</pubDate><title>Message #3809825</title><guid isPermaLink="false">3809825@Uncensored</guid><description><![CDATA[Seriously, it was so robust, and so reliable, that it was kind of sad to retire
it when universal IP connectivity made it obsolete. 
  
 For a year or two before this site went onto the Internet full time, we were
using UUCP over a demand-dialed Internet connection to pick up mail because
it was (and still is) more reliable than any of the other methods available
to coax SMTP into sending mail at the right time to a host that isn't always
up. 
  
 Most people also don't know that we were providing free Internet mail to
the entire Citadel dialup network.  I made it clear that we created a node
called "internet" and you could send mail to addresses like "foo%bar.com @
Internet" and it would do the right thing in both directions, but nobody paid
attention because I wasn't part of the Minnesota in-crowd. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=3809645</link><pubDate>Tue, 04 Nov 2014 15:32:06 -0000</pubDate><title>Message #3809645</title><guid isPermaLink="false">3809645@Uncensored</guid><description><![CDATA[ People still ****use**** UUCP ????? <evil grin> 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=3809458</link><pubDate>Tue, 04 Nov 2014 14:58:58 -0000</pubDate><title>Message #3809458</title><guid isPermaLink="false">3809458@Uncensored</guid><description><![CDATA[Network connections are so simple now, it's easy to forget what a remarkable
feat of engineering UUCP was. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=3804511</link><pubDate>Wed, 29 Oct 2014 04:21:02 -0000</pubDate><title>Message #3804511</title><guid isPermaLink="false">3804511@Uncensored</guid><description><![CDATA[ As a point of interest, Jersey Devil Citadel (Citadel:K2NE v6.8) started
handling inter-node email by "tunneling" the emails through the packet radio
network, and then back to the "regular" internet. Kludgey, but it worked.

  
 Later we did the same thing through UUCP using UUCICO, which also worked
but was even kludgier. 
  
 We abandoned all that in favor of just doing it via dial-up which worked
perfectly. For that era. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=3804509</link><pubDate>Wed, 29 Oct 2014 04:17:39 -0000</pubDate><title>Message #3804509</title><guid isPermaLink="false">3804509@Uncensored</guid><description><![CDATA[ > Oct 28 2014 5:43pm from IGnatius T Foobar @uncnsrd (Uncensored)   
 >Yes, of course, but you were talking about it in a "prepper" context,  

 >so one would presume that in a SHTF situation, the link between my   
 >house and the data center would be offline.   
 >   
 >  
  
 Yes - but then you seemed enthused at putting the BBS online, which is when
my emphasis shifted. 
  
 --K2NE 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=3804458</link><pubDate>Wed, 29 Oct 2014 00:43:34 -0000</pubDate><title>Message #3804458</title><guid isPermaLink="false">3804458@Uncensored</guid><description><![CDATA[Yes, of course, but you were talking about it in a "prepper" context, so one
would presume that in a SHTF situation, the link between my house and the
data center would be offline. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=3804423</link><pubDate>Tue, 28 Oct 2014 22:41:21 -0000</pubDate><title>Message #3804423</title><guid isPermaLink="false">3804423@Uncensored</guid><description><![CDATA[ > Oct 28 2014 12:02pm from IGnatius T Foobar @uncnsrd (Uncensored)      
  
 >Establishing an AX.25 presence for Uncensored is a super idea.  The    
    
 >only problem is ... Uncensored hasn't been run from my house since     
   
 >2007.           
 >         
 >        
        
 The only thing "required" to be at your house is the ham transceiver.   
   
 So the problem is:       
      
 1. install AX.25 on your remote linux box     
 2. have the "ham login shell" talk to uncensored through a separate SSH connection
(hamuser@ comes to mind).     
 3. inbound and outbound AX.25 packets can be routed to a linux box at your
house which is then connected to a packet terminal node controller (TNC) which
then connects to your (2 meter) transceiver.     
      
 Configure everything on the ham stuff at *your* house and *bam* **done**.
    
    
 Oh, you'll need to contact the folks at Berkeley
who administer the AMPR.ORG domain and get a nodename (I'll use me as the
example.... k2ne.ampr.org) and routing. The rest is handled over the internet.
  
    
 Easy. You'll of course, have to configure your remote linux box for a second
interface to handle the .ampr.org in/out traffic but other than that it is
a lot easier than it sounds.   
  
 --K2NE 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=3804341</link><pubDate>Tue, 28 Oct 2014 19:02:23 -0000</pubDate><title>Message #3804341</title><guid isPermaLink="false">3804341@Uncensored</guid><description><![CDATA[Establishing an AX.25 presence for Uncensored is a super idea.  The only problem
is ... Uncensored hasn't been run from my house since 2007.   
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=3804278</link><pubDate>Tue, 28 Oct 2014 16:59:05 -0000</pubDate><title>Message #3804278</title><guid isPermaLink="false">3804278@Uncensored</guid><description><![CDATA[  
 Interesting. Sort of the problem, though, is tricking your laptop, iPad etc
out so that it has enough transmit power to talk BACK to your tricked-out
base station from any distance... eh? 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=3804270</link><pubDate>Tue, 28 Oct 2014 16:47:33 -0000</pubDate><title>Message #3804270</title><guid isPermaLink="false">3804270@Uncensored</guid><description><![CDATA[ >    
 > If I ever decide to take up ham radio, it'll be on its own terms and  

 >for its own purposes.   
 >   
  
 If there is even the slightest bit of "prepper" in you, the time to "take
up ham radio" is now. 
  
 There is a rapidly growing "movement" toward the establishment of a mesh
network using commercially available ethernet routers that also do WiFi -
on the shared band (WiFi and ham radio - I believe it is 5Ghz) where WiFi
channels 6 and up actually lie inside the (primary service) amateur radio
allocation. 
  
 There's ham-hacked firmware for the routers that qualify. 
 You can run up to the legal amateur radio limit in power output from the
transmitter (1,000 watts). 
 You can build and use any antenna system your brain can conjure. 
  
 You are no longer limited to "what is legal" under WiFi or WiLAN rules. 
  
 And just about, if not all, linux distros have the AX.25/ham
stuff either already built in, or easily installed via apt-get. (or your distro's
equivalent). 
  
 And since your 'uncensored' Citadel is - for all intent and purposes - completely
void of commercial content (meaning: nobody is buying or selling as a business;
used stuff is ham-legal), you could even have your BBS accessable via ham
packet radio. 
  
 Now, is THAT enough reason?!?! <very evil grin> 
  
 --K2NE 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=3804218</link><pubDate>Tue, 28 Oct 2014 15:25:46 -0000</pubDate><title>Message #3804218</title><guid isPermaLink="false">3804218@Uncensored</guid><description><![CDATA[But I *like* having a commercial grade access point in my stairway.  It's
a nerd trophy sort of thing.  The fact that the wiring is concealed inside
the walls is a handyman pride sort of thing. 
  
 If I ever decide to take up ham radio, it'll be on its own terms and for
its own purposes. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=3804143</link><pubDate>Tue, 28 Oct 2014 06:22:38 -0000</pubDate><title>Message #3804143</title><guid isPermaLink="false">3804143@Uncensored</guid><description><![CDATA[ > Oct 27 2014 1:52pm from IGnatius T Foobar @uncnsrd (Uncensored)   
 >I could, but then I'd have a 5 GHz discone antenna, a small coax  
 >jumper, a receive pre-amp and a 5w transmit amplifier sitting in my  
 >stairway.  I don't think the license would be the limiting factor.  
 >  
  
 The point was that it would no longer have to be in your stairway... 
 --K2NE 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=3804013</link><pubDate>Mon, 27 Oct 2014 20:52:18 -0000</pubDate><title>Message #3804013</title><guid isPermaLink="false">3804013@Uncensored</guid><description><![CDATA[<html><body>

<p>I could, but then I'd have a 5 GHz discone antenna, a small coax jumper, a receive pre-amp and a 5w transmit amplifier sitting in my stairway.  I don't think the license would be the limiting factor.</p>
<p><img src="http://pbs.twimg.com/media/B0-07bOIUAAwqVh.jpg" alt="" width="600" height="450" /></p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=3803520</link><pubDate>Sun, 26 Oct 2014 19:23:42 -0000</pubDate><title>Message #3803520</title><guid isPermaLink="false">3803520@Uncensored</guid><description><![CDATA[ You could have done the same thing with a home-built 5 Ghz discone antenna,
a small coax jumper, a receive pre-amp and a 5w transmit amplifier and...
oh, forgot, you don't have that ham license... <evil grin>   
  
 --K2NE 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=3803476</link><pubDate>Sun, 26 Oct 2014 13:47:37 -0000</pubDate><title>Message #3803476</title><guid isPermaLink="false">3803476@Uncensored</guid><description><![CDATA[  
 I'm a nerd and I like it! 
  
 Ever since we moved into the new house I've had trouble with wifi.  I can't
really move the main router, and I didn't like having to run two of them.
 So I bought a commercial grade access point, a Cisco Aironet AP1242 on eBay
for $50. 
  
 These things sell for pretty cheap because they're usually found "in the
wild" with a dependency on Cisco's wireless controller hardware.  But if you
know where to get the right firmware, and have the skills to reload it, they
can be turned into really good quality standalone access points. 
  
 Now I've got mine placed on a wall at the bottom of a stairway right in the
center of the house.  The cable from it is completely concealed, as it runs
through the wall into the closet of my son's ground floor bedroom (yes I could
have probably just put the AP *in* the closet, but I'm a nerd and I want my
Cisco on display) and
I even got a midspan PoE injector back in the equipment rack to power it.

  
 The wifi radio in the router has now been shut off, the second router has
been decommissioned, the whole house now has good coverage, and I am a happy
nerd. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=3792692</link><pubDate>Mon, 13 Oct 2014 02:42:20 -0000</pubDate><title>Message #3792692</title><guid isPermaLink="false">3792692@Uncensored</guid><description><![CDATA[<html><body>

<p>I just commented about this with a friend that is doing some testing with tablets (android and i-whatevers) for a wide roll-out of tablets, and the Surface and RT had not even been considered.</p>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=3791505</link><pubDate>Fri, 10 Oct 2014 23:28:38 -0000</pubDate><title>Message #3791505</title><guid isPermaLink="false">3791505@Uncensored</guid><description><![CDATA[<html><body>

<p>What's sad to watch is that they won't let RT or Surface die.</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=3784604</link><pubDate>Tue, 30 Sep 2014 04:29:08 -0000</pubDate><title>Message #3784604</title><guid isPermaLink="false">3784604@Uncensored</guid><description><![CDATA[<html><body>

<p>If you are un-lucky enough to know someone that runs RT, it is sad to watch.  They get those cartoon safes dropped on them.</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=3784366</link><pubDate>Mon, 29 Sep 2014 14:29:21 -0000</pubDate><title>Message #3784366</title><guid isPermaLink="false">3784366@Uncensored</guid><description><![CDATA[  
 It's a little known fact that Ballmer visits random homes and throws chairs
at people while they use Windows. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=3783993</link><pubDate>Mon, 29 Sep 2014 13:55:28 -0000</pubDate><title>Message #3783993</title><guid isPermaLink="false">3783993@Uncensored</guid><description><![CDATA[ > The fact that I have Windows machines in my network gives me The Pain.
 
  
 That's just the blunt force trauma from Ballmer throwing a chair at you.

]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=3781111</link><pubDate>Wed, 24 Sep 2014 18:16:23 -0000</pubDate><title>Message #3781111</title><guid isPermaLink="false">3781111@Uncensored</guid><description><![CDATA[ > Sep 24 2014 5:30am from fleeb @uncnsrd (Uncensored)   
 >    
 > The fact that I have Windows machines in my network gives me The Pain.
 
 >  
 >   
  
 As well it should! 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=3780811</link><pubDate>Wed, 24 Sep 2014 12:30:24 -0000</pubDate><title>Message #3780811</title><guid isPermaLink="false">3780811@Uncensored</guid><description><![CDATA[  
 The fact that I have Windows machines in my network gives me The Pain. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=3780600</link><pubDate>Wed, 24 Sep 2014 11:07:29 -0000</pubDate><title>Message #3780600</title><guid isPermaLink="false">3780600@Uncensored</guid><description><![CDATA[If you've got a real firewall on your network, turn off the stupid Windows
Firewall.  It's only going to give you THE PAIN. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=3779325</link><pubDate>Mon, 22 Sep 2014 12:30:17 -0000</pubDate><title>Message #3779325</title><guid isPermaLink="false">3779325@Uncensored</guid><description><![CDATA[  
 A few things... 
  
 1. The fucking cable modem that Comcast gave me doesn't do IPv6.  So, if
I want to play with IPv6 in the general Internet, I need to replace this modem.
 I want Comcast to do it... and since I'm a business customer, I can simply
cite a business need for it.  Which is actually fairly true; I want to test
IPv6 for professional reasons. 
  
 2. It turns out, I can communicate with the printer just fine on the other
subnet.  In fact, I can communicate with all the machines on the other subnet
without issue... pfSense is doing its job quite nicely, without having to
do much with the firewall.  I had mistaken the lack of pings to one of the
computers on the other side as a sign that the packets were not making it
there, when in fact, they were, but Microsoft doesn't respond to pings outside
of its current subnet.  When I pinged the printer directly, I got responses.
 So,
getting the printer to work is more a matter of figuring out how to deal with
the damned drivers for the printer than networking... and the way to solve
that is to put the machine to communicate with the printer on the other subnet,
configure the printer, then return to my normal subnet.  I haven't done this
yet, but I know it'll work. 
  
 3. I'm going to hold off on changing my switches.  I want to let my money
build up for a little bit before I buy some gigabit switches.  This will give
me a chance to research the kind of switches I want, etc. 
  
 My home network isn't really that complicated, but it probably will be as
I experiment with features.  I only really have the following: 
  
 1. Two regularly-used computers that do the heaviest networking. 
 2. Wireless router for cell phones and laptops (visiting or personal). 
 3. Chromecast device on my television set, which communicates
wirelessly. 
 4. A tablet that can act as a full-fledged Microsoft OS 8.1 computer (for
developing closed-captioning stuff). 
 5. Raspberry Pi for playing/research 
 6. Two old laptops, one of which I think I'm giving away to Melvin's aunt.

 7. Two cell phones, one decommissioned but used occasionally for two-phase
password crap that I haven't shifted to the other cell phone, and the other
I use as an actual cell-phone. 
 8. An Android tablet 
  
 Several of these devices work wirelessly, and I suspect I want to ensure
all the wireless stuff works over an alternative set of IP addresses rather
than the current set, just to keep them separated from the other machines.
 That might be my first goal, to try and segregate wireless from wired (apparently,
my wireless router is more of a wireless bridge than router). 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=3778664</link><pubDate>Mon, 22 Sep 2014 05:19:53 -0000</pubDate><title>Message #3778664</title><guid isPermaLink="false">3778664@Uncensored</guid><description><![CDATA[<html><body>

<p>fleeb, your home network sounds a bit more complicated than mine.  Let us know what you find out, as I might learn something.</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=3777862</link><pubDate>Sat, 20 Sep 2014 14:33:31 -0000</pubDate><title>Message #3777862</title><guid isPermaLink="false">3777862@Uncensored</guid><description><![CDATA[  
 I'm dipping in it now. 
  
 It has already addressed one of the little problems that annoyed me... something
related to occasional failed DNS queries from my original router. 
  
 Those queries are FAST.  Very nice. 
  
 I have some new problems (my fault), but I figure eventually I'll figure
out how to resolve those.  I divided my home into two networks because I didn't
have the logistics for the single network at the moment.  Now, because my
printer is in another subnet, even though I can access that subnet, my computer
doesn't seem to want to work with it. 
  
 I want to replace all my switches anyway.  They are all old 100T switches,
and I think 1000T seems to be normal these days. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=3777767</link><pubDate>Sat, 20 Sep 2014 06:00:56 -0000</pubDate><title>Message #3777767</title><guid isPermaLink="false">3777767@Uncensored</guid><description><![CDATA[<html><body>

<p>pFsense is pretty cool stuff.  I have a few in place and it has (for the most part) done what I wanted.  There were rough edges that burned you for a bit in the earlier releases that seem to have been smoothed out in the later ones.  You can do some complicated plumbing with those little boxes.</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=3775945</link><pubDate>Thu, 18 Sep 2014 11:05:22 -0000</pubDate><title>Message #3775945</title><guid isPermaLink="false">3775945@Uncensored</guid><description><![CDATA[    
 After a full week of hellish delivery nonsense with FedEx, I finally received
my new hardware firewall from pfSense.   
    
 It has no fans, but it doesn't get very hot (just a tad warm, but cooler
than some of the switches I've had).  When it starts, after establishing a
WAN connection, it plays a little tune, which I didn't quite expect.   
    
 I've used the pfSense software before.  This thing has tons of bells and
whistles that should help me manage anything I might want to manage in my
network.   
    
 It has three NICs... one labelled 'WAN', another labelled 'LAN', and one
more labelled 'OPT'.  I think for most home offices, this is perfect; the
WAN obviously connects nicely with the cable modem (or DSL, or whatever),
the LAN for the home computers that we use for browsing the internet or playing
games or whatever, and I could use OPT for servers that I'd like to run from
home.  
  
 Not that it matters how you actually set things up; the firewall treats each
of these equally, allowing tremendous flexibility in how you set up your environment.
 But they do have some preliminary things set up that makes using the ports
in this fashion more convenient. 
  
 I haven't researched it yet, but it's my understanding this thing can allow
you to set up another set of IP addresses isolated from the usual set of IP
addresses that allow certain machines to communicate with each other in a
different network, yet the same ethernet segment.  Depending on how fancy
I get with it, I might set up servers in OPT, and configure another set of
addresses for communicating with those servers such that only specific machines
have access to them for maintenance purposes, just as added security. 
  
 Or whatever.  I've always kind of found this sort of thing nifty, but I haven't
had anything powerful enough to really play around. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=3720567</link><pubDate>Sun, 01 Jun 2014 00:58:55 -0000</pubDate><title>Message #3720567</title><guid isPermaLink="false">3720567@Uncensored</guid><description><![CDATA[ > Hmm... on Windows, changing the ethertype seems to be more involved.  
 
 >I haven't figured that out yet.  There must be a way, though...   
  
 Yes, there's an easy way.   RTOOS ! 
  
 (I know, I know ... but it had to be said) 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=3719869</link><pubDate>Sat, 31 May 2014 02:44:50 -0000</pubDate><title>Message #3719869</title><guid isPermaLink="false">3719869@Uncensored</guid><description><![CDATA[ > May 30 2014 2:19pm from ax25 @uncnsrd (Uncensored)   
 >I have not tried this since the days of DOS, but BPQ32 might fit the  
 >bill:   
 >  
 >http://www.cantab.net/users/john.wiseman/Documents/BPQ32.html   
 >  
 >More specifically the driver here:   
 >  
 >http://www.cantab.net/users/john.wiseman/Documents/BPQ%20Ethernet.htm  
 >  
  
 And lest we forget, KA9Q 'NOS' may also be helpful... ;) 
  
 --K2NE 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=3719823</link><pubDate>Fri, 30 May 2014 21:19:53 -0000</pubDate><title>Message #3719823</title><guid isPermaLink="false">3719823@Uncensored</guid><description><![CDATA[<html><body>

<p>I have not tried this since the days of DOS, but BPQ32 might fit the bill:</p>
<p>http://www.cantab.net/users/john.wiseman/Documents/BPQ32.html</p>
<p>More specifically the driver here:</p>
<p>http://www.cantab.net/users/john.wiseman/Documents/BPQ%20Ethernet.htm</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=3719765</link><pubDate>Fri, 30 May 2014 17:00:34 -0000</pubDate><title>Message #3719765</title><guid isPermaLink="false">3719765@Uncensored</guid><description><![CDATA[  
 (looked over the link you sent) 
  
 Yep, Linux.  Trivial, after a fashion, in Linux. 
  
 But for Windows, I need to take the source, and seriously rework some things
to make it provide a protocol mini-filter that would work for Windows. 
  
 Which is tempting in some ways.  I'd love to do it just for shits and giggles.

]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=3719764</link><pubDate>Fri, 30 May 2014 16:58:15 -0000</pubDate><title>Message #3719764</title><guid isPermaLink="false">3719764@Uncensored</guid><description><![CDATA[  
 So how does one manage to use such a stack in userland without having the
operating system (in my case, Windows) complaining that it doesn't know anything
about that framing (e.g. it can't build a socket for that framing)? 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=3719744</link><pubDate>Fri, 30 May 2014 15:40:36 -0000</pubDate><title>Message #3719744</title><guid isPermaLink="false">3719744@Uncensored</guid><description><![CDATA[<html><body>

<p>BPQether is not ip ethernet framing 0x800, it is 0x08ff.  Probably not good if you are routing as it most likely won't get routed properly.</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=3719690</link><pubDate>Fri, 30 May 2014 12:35:55 -0000</pubDate><title>Message #3719690</title><guid isPermaLink="false">3719690@Uncensored</guid><description><![CDATA[  
 Gads... my English there is atrocious.  What the hell is happening to me?

]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=3719686</link><pubDate>Fri, 30 May 2014 12:35:36 -0000</pubDate><title>Message #3719686</title><guid isPermaLink="false">3719686@Uncensored</guid><description><![CDATA[  
 Mind if, if it's ax.25 over TCP/IP, I can't use it.  That's one of the things
I'm researching as I look over these things. 
  
 And from what I've seen, the only way I can get around using TCP/IP involves
building a protocol driver for Windows.  User-land stacks seem to go over
TCP/IP in the end, which isn't helpful t ome. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=3719598</link><pubDate>Fri, 30 May 2014 04:27:02 -0000</pubDate><title>Message #3719598</title><guid isPermaLink="false">3719598@Uncensored</guid><description><![CDATA[<html><body>

<p>http://tldp.org/HOWTO/AX25-HOWTO/x495.html</p>
<p>Look at 6.1.11</p>
<p>I need to give this a shot.  Sounds like fun!</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=3719597</link><pubDate>Fri, 30 May 2014 04:10:33 -0000</pubDate><title>Message #3719597</title><guid isPermaLink="false">3719597@Uncensored</guid><description><![CDATA[<html><body>

<p>BPQeth might be worth a go:</p>
<p>(Sorry, Hungarian, so I ran it through google translate) - original url buried in there somewhere:</p>
<p>http://translate.google.com/translate?hl=en&amp;sl=hu&amp;u=http://wiki.ham.hu/index.php/BPQether_interf%25C3%25A9sz&amp;prev=/search%3Fq%3Dbpqether%26start%3D40%26client%3Dubuntu%26hs%3DSWF%26sa%3DN%26channel%3Dfs%26biw%3D1280%26bih%3D680</p>
<p>Sounds like you could run the whole ax.25 stack (fun stuff!).  Wish I was young again and could take part.  I have not run the BPQether driver, but I have played around a bit with the rest of the ax.25 user-land stack a bit, so ping me if you find anything of interest or want to ask a lay-person some questions on usage or whatnot that might not be in google already.</p>
<p>Please post back here results of the fun as well, as I think it would fit the room description quite well.</p>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=3719488</link><pubDate>Thu, 29 May 2014 15:18:08 -0000</pubDate><title>Message #3719488</title><guid isPermaLink="false">3719488@Uncensored</guid><description><![CDATA[  
 Hummm... I think I can do this in user-land with my own stack.  Maybe.  It's
certainly interesting, getting into this area of networking. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=3719471</link><pubDate>Thu, 29 May 2014 14:20:30 -0000</pubDate><title>Message #3719471</title><guid isPermaLink="false">3719471@Uncensored</guid><description><![CDATA[  
 Hmm... on Windows, changing the ethertype seems to be more involved.  I haven't
figured that out yet.  There must be a way, though... 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=3719317</link><pubDate>Thu, 29 May 2014 02:29:30 -0000</pubDate><title>Message #3719317</title><guid isPermaLink="false">3719317@Uncensored</guid><description><![CDATA[Yeah, that's coming from experience building and troubleshooting networks
during the 1990's.  Why is teh Novell busted?  Because it speaks IPX over
four different frame types.  Choose mismatching frame types and your network
nodes are blind to each other. 
  
 Running IPX frames over raw 802.3 was a naive decision on Novell's part.
 Choosing to replace it with not one but *three* non-raw frame types was just
plain stupid.  DIX Ethernet (what Novell called "Ethernet_II") was, is, and
always will be the correct frame type to use on an Ethernet segment.  802.2
SAP and SNAP were both atrocious. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=3717283</link><pubDate>Tue, 27 May 2014 12:44:09 -0000</pubDate><title>Message #3717283</title><guid isPermaLink="false">3717283@Uncensored</guid><description><![CDATA[  
 Oh, that's interesting.  I have full control over the machines (they are
virtual).  I'll look into that, as that seems like the easiest option. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=3717169</link><pubDate>Tue, 27 May 2014 02:59:13 -0000</pubDate><title>Message #3717169</title><guid isPermaLink="false">3717169@Uncensored</guid><description><![CDATA[ > I actually want to trasmit information over it, but I don't want the  

 >information to be seen by tools that normally look for TCP/UDP packets 
 
 >(not because I'm trying to be secret, but because I don't want to   
 >distract).   
  
 Depending on how much control you have over the operating system implementation
on each end, you could simply change the IP stack to use an Ethertype other
than 0x0800 (or other than 0x86DD, if you're on IPv6).  If the Ethertype is
different, sniffer software will simply see frames for an unknown protocol
and pass them through opaquely. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=3717128</link><pubDate>Mon, 26 May 2014 21:08:47 -0000</pubDate><title>Message #3717128</title><guid isPermaLink="false">3717128@Uncensored</guid><description><![CDATA[  
 Ah... I'll look into it, then.  Whatever turns out to be the easiest thing
to work with we could use.  But, I'll need to make sure that it isn/t implemented
over a TCP/IP stack or anything weird like that.... something pure. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=3716150</link><pubDate>Fri, 23 May 2014 22:57:08 -0000</pubDate><title>Message #3716150</title><guid isPermaLink="false">3716150@Uncensored</guid><description><![CDATA[ > May 23 2014 12:00pm from fleeb @uncnsrd (Uncensored)   
 >    
 > Hm, no, I hadn't thought of that.   
 >    
 > But then, these are virtual machines.  They all live inside one box,  

 >and need to communicate with each other.  Using ham packet radio   
 >transmissions, while very novel, probably wouldn't work well for our   
 >needs.   
 >   
 >  
  
 AX.25 works over ethernet or WiFi as well as "ham radio." It's a protocol
and it is "medium neutral." 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=3715949</link><pubDate>Fri, 23 May 2014 19:00:48 -0000</pubDate><title>Message #3715949</title><guid isPermaLink="false">3715949@Uncensored</guid><description><![CDATA[  
 Hm, no, I hadn't thought of that. 
  
 But then, these are virtual machines.  They all live inside one box, and
need to communicate with each other.  Using ham packet radio transmissions,
while very novel, probably wouldn't work well for our needs. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=3715944</link><pubDate>Fri, 23 May 2014 18:48:17 -0000</pubDate><title>Message #3715944</title><guid isPermaLink="false">3715944@Uncensored</guid><description><![CDATA[ fleeb - have you ever considered the AX.25 (ham packet radio) package that
can be compiled into most linux kernels? 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=3715420</link><pubDate>Thu, 22 May 2014 21:01:02 -0000</pubDate><title>Message #3715420</title><guid isPermaLink="false">3715420@Uncensored</guid><description><![CDATA[  
 I actually want to trasmit information over it, but I don't want the information
to be seen by tools that normally look for TCP/UDP packets (not because I'm
trying to be secret, but because I don't want to distract). 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=3715409</link><pubDate>Thu, 22 May 2014 19:59:35 -0000</pubDate><title>Message #3715409</title><guid isPermaLink="false">3715409@Uncensored</guid><description><![CDATA[<html><body>

<p>if its only for the shake you could also use l2tp...</p>
<p>I guess everything else died - for a particular reason. </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=3714922</link><pubDate>Wed, 21 May 2014 16:40:32 -0000</pubDate><title>Message #3714922</title><guid isPermaLink="false">3714922@Uncensored</guid><description><![CDATA[  
 Hm.  Even better, there's SCTP. 
  
 It's a protocol that has been around a while, but remains supported in some
fashion.  I can even download a user-land stack for it that can be compiled
on Linux or Windows, and it looks to be better able to avoid SYN attacks.

  
 Works over IP.  Hm.  Neat stuff. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=3714866</link><pubDate>Wed, 21 May 2014 13:13:52 -0000</pubDate><title>Message #3714866</title><guid isPermaLink="false">3714866@Uncensored</guid><description><![CDATA[  
 Yeah, I think IPX/SPX is more the way to go, if we elect to go down the road
of an alternative protocol. 
  
 We can't use something that goes over TCP/IP for our purposes... we're trying
to hide communications on the LAN (so students do not confuse our traffic
for the kind of traffic they seek in their lessons). 
  
 We have other alternatives, but they aren't necessarily very good (e.g. virtual
serial ports). 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=3714776</link><pubDate>Tue, 20 May 2014 23:44:18 -0000</pubDate><title>Message #3714776</title><guid isPermaLink="false">3714776@Uncensored</guid><description><![CDATA[There was an attempt at it years ago, but it fell by the wayside as both Microsoft
and Samba began migrating away from NBT and towards running CIFS directly
on port 445. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=3714759</link><pubDate>Tue, 20 May 2014 21:20:05 -0000</pubDate><title>Message #3714759</title><guid isPermaLink="false">3714759@Uncensored</guid><description><![CDATA[  
 For what I'm thinking, the machines would not require routing (they're all
on the same segment). 
  
 But then, I suppose I could use NetBEUI as well.  I just don't know if NetBEUI
is available for Linux. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=3714757</link><pubDate>Tue, 20 May 2014 21:12:54 -0000</pubDate><title>Message #3714757</title><guid isPermaLink="false">3714757@Uncensored</guid><description><![CDATA[<html><body>

<p>You could probably build a local network with it.  Good luck getting your hands on something to route traffic between different IPX subnets.</p>
<p>(Horrible memories of routers with fixed size RIP/SAP tables and seeing networks and services randomly drop off the network...)</p>
<p>I do think that the deployment of IPv6 is going to bring back some of the old IPX traditions.  An IPX address was 32 bits of network and 48 bits of host, with the host side being a MAC address.  IPv6 can autoconfig based on MAC address when the subnet size is /64 (as is recommended and typical).  I think we'll see a lot of "let it autoconfig and register itself with DNS" which is an awful lot like "get an address from RIP and register your name with SAP"</p>
<p> </p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=3714751</link><pubDate>Tue, 20 May 2014 20:41:05 -0000</pubDate><title>Message #3714751</title><guid isPermaLink="false">3714751@Uncensored</guid><description><![CDATA[  
 Okay, throwing out some weird here... 
  
 Remember IPX/SPX? 
  
 I wonder if it's still possible to set up a functioning network with those
protocols today, and what limitations one might expect from it. 
  
 Hmmm... 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=3570412</link><pubDate>Mon, 21 Oct 2013 18:31:27 -0000</pubDate><title>Message #3570412</title><guid isPermaLink="false">3570412@Uncensored</guid><description><![CDATA[<html><body>

<p>Oooh, new Chrome fiddlybits.  /me likes.</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=3551941</link><pubDate>Fri, 04 Oct 2013 14:24:50 -0000</pubDate><title>Message #3551941</title><guid isPermaLink="false">3551941@Uncensored</guid><description><![CDATA[  
 New-to-me security tools: 
  
 http://blog.chromium.org/2011/06/new-chromium-security-features-june.html 
  
 chrome://net-internals/#hsts 
  
 ^^^ mandatory SSL and certificate pinning for Chrome 
  
 http://technet.microsoft.com/en-us/security/jj653751 
  
 ^^^ finer control over ASLR, the NX bit, stack smashing for Windows, and certificate pinning for IE 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=3551866</link><pubDate>Fri, 04 Oct 2013 03:39:44 -0000</pubDate><title>Message #3551866</title><guid isPermaLink="false">3551866@Uncensored</guid><description><![CDATA[<html><body>

<p> </p>
<blockquote>
<div class="message_header"><span>Thu Oct 03 2013 01:18:53 PM EDT</span> <span>from vince-q @ Cascade Lodge BBS </span></div>
<div class="message_content">
<p>Hmmmm...</p>
<p>Is this thing working?????</p>
<br /><br /></div>
</blockquote>
<p>You gots to blow on it, or jiggle it :-)</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=3551795</link><pubDate>Thu, 03 Oct 2013 17:24:51 -0000</pubDate><title>Message #3551795</title><guid isPermaLink="false">3551795@Uncensored</guid><description><![CDATA[ > Oct 3 2013 1:18pm from vince-q @cascade (Cascade Lodge BBS)   
 >Hmmmm...   
 >  
 >Is this thing working?????  
 >  
  
 Looks that way... 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=3551793</link><pubDate>Thu, 03 Oct 2013 17:18:53 -0000</pubDate><title>Message #3551793</title><guid isPermaLink="false">3551793@Uncensored</guid><description><![CDATA[<html><body>

<p>Hmmmm...</p>
<p>Is this thing working?????</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=3549891</link><pubDate>Tue, 01 Oct 2013 12:37:21 -0000</pubDate><title>Message #3549891</title><guid isPermaLink="false">3549891@Uncensored</guid><description><![CDATA[ > Yeah, there are some arcane options to openssl's commandline that let 
 
 >you override the default exponent. There are only a few that are   
 >commonly in use, and the only one that's broadly acceptable to all   
 >software, and also secure under the most stringent standards, is   
 >probably 65537   
  
 I learned that 65537 is the default for OpenSSL while learning how to check
to see if a certificate matches a particular public key (such as, when a CSR
is sent out to a customer and then the cert they send back may or may not
be generated from the CSR you gave them ... some people do weird things).
 "Compare the modulus and exponent."  And I said "gee, the exponent is *always*
65537, what's with that?" 
  
 I want to try an exponent of 0 and see what happens  :) 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=3549890</link><pubDate>Tue, 01 Oct 2013 12:32:30 -0000</pubDate><title>Message #3549890</title><guid isPermaLink="false">3549890@Uncensored</guid><description><![CDATA[Heh.  Back when we had a ridiculously low budget, we came into possession
of some Isilon boxes.  Their schtick is that there's no big box, just lots
of little ones tied together with Infiniband.  I ripped out the Infiniband
cards, threw away their software, and loaded OpenFiler on them.  NFS for the
win - even at 1 Gbps it was a great performer. 
  
 This year we have upper management that wants us to be Teh Cloud (tm) so
we got the budget for NetApp hardware.  Yum.  It's pricey but the performance
just screams.  Because cloud. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=3549829</link><pubDate>Tue, 01 Oct 2013 03:17:20 -0000</pubDate><title>Message #3549829</title><guid isPermaLink="false">3549829@Uncensored</guid><description><![CDATA[<html><body>

<p> </p>
<blockquote>
<div class="message_header"><span>Mon Sep 30 2013 8:13 AM EDT</span> <span>from IGnatius T Foobar @ Uncensored </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY">
<blockquote>Off the shelf solution or something you built? </blockquote>
<br />In this case it's a storage system from this little outfit called NetApp <br />:) <br /><br />However ... the decision was based on experience that included homebrew storage. <br />Even at 1 Gbps, our little NFS boxes were far easier to manage than big-vendor iSCSI. I never want to read the words "logical volume not on preferred path" again. Several of my future homicide victims will have those words written on their gravestones. </div>
</div>
</blockquote>
<p>Funny you should say.  I just remembered Coraid the other day and thought, what if they were still not just sales droids, but actually wanted to sell something to some company without coming off as being a used car salesman.  I took the bait and researched what little there was on the internets to be gleaned and finally had to go to the website and post a "gimmie a quote you slimy so and so" request.  The site made it seem like you were filling in a quote sheet that would be automated and sent out in a few minutes, but it was not until the next morning that I found out that 'it's a  trap' was in store.</p>
<p>The sales droid first sent me an email with no body text (yes I use alpine as my mail client), but I digress.  The second email was one to implore me to call him back for the quote.  After a few hours he emailed me a sketchy pdf which contained the semi plausible bits that described a 1GBps/10GBps san unit (without enough details and enough asterisks to choke a horse stating that you needed a support contract on top of the purchase price of the hardware before they would sell you the minimum hardware).  Even the base price (minus any drives) was enough to make me go away.</p>
<p>Glad you had more fun in that arena IG.  I have opted for simple raid 1+0 and NFS to fit the bill for now as the needs have not shot past that (yet).</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=3549673</link><pubDate>Mon, 30 Sep 2013 23:51:46 -0000</pubDate><title>Message #3549673</title><guid isPermaLink="false">3549673@Uncensored</guid><description><![CDATA[ >big-vendor iSCSI.  I never want to read the words "logical volume not  

 >on preferred path" again.  Several of my future homicide victims will  

 >have those words written on their gravestones.   
  
 Heh. My FHVs are going to have "Abort/Retry/Ignore? >" on *their* gravestones!
<evil grin> 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=3549504</link><pubDate>Mon, 30 Sep 2013 21:17:40 -0000</pubDate><title>Message #3549504</title><guid isPermaLink="false">3549504@Uncensored</guid><description><![CDATA[ >Finally got around to reading that.  Bizarre.  Can you even generate a 
 
 >key with a specific exponent, or do you have to just keep re-keying   
 >until you get something acceptable?   
  
 Yeah, there are some arcane options to openssl's commandline that let you
override the default exponent. There are only a few that are commonly in use,
and the only one that's broadly acceptable to all software, and also secure
under the most stringent standards, is probably 65537 
  
 But it's all pointless unless you ensure that every CA cert in the chain
that signs your key, also uses a large exponent. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=3548809</link><pubDate>Mon, 30 Sep 2013 13:08:13 -0000</pubDate><title>Message #3548809</title><guid isPermaLink="false">3548809@Uncensored</guid><description><![CDATA[ >Off the shelf solution or something you built?  
  
 In this case it's a storage system from this little outfit called NetApp
 :) 
  
 However ... the decision was based on experience that included homebrew storage.
 Even at 1 Gbps, our little NFS boxes were far easier to manage than big-vendor
iSCSI.  I never want to read the words "logical volume not on preferred path"
again.  Several of my future homicide victims will have those words written
on their gravestones. 
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=3548803</link><pubDate>Mon, 30 Sep 2013 12:19:18 -0000</pubDate><title>Message #3548803</title><guid isPermaLink="false">3548803@Uncensored</guid><description><![CDATA[<html><body>

<p> </p>
<blockquote>
<div class="message_header"><span>Mon Jan 14 2013 11:30:42 PM EST</span> <span>from IGnatius T Foobar @ Uncensored </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY">After a whole lot of pain with iSCSI multipath stupidness, I am swearing off block protocols for good. Everything I put in my data center is going to be NFS over 10 Gbps Ethernet from now on. <br /><br />It Just Works (tm). </div>
</div>
</blockquote>
<p>Off the shelf solution or something you built?</p>
</body></html>
]]></description></item><item><link>https://uncensored.citadel.org/readfwd?go=Networking?start_reading_at=3548794</link><pubDate>Mon, 30 Sep 2013 11:43:51 -0000</pubDate><title>Message #3548794</title><guid isPermaLink="false">3548794@Uncensored</guid><description><![CDATA[Finally got around to reading that.  Bizarre.  Can you even generate a key
with a specific exponent, or do you have to just keep re-keying until you
get something acceptable? 
]]></description></item></channel></rss>

