r00ty

joined 2 years ago
[–] r00ty@kbin.life 2 points 4 months ago

Oh. Internal hosts, I just setup on my own DNS.. No need for that. Printer, can't say I've ever had a problem.

[–] r00ty@kbin.life 3 points 4 months ago (2 children)

Yeah, I don't really have a use at home for mDNS. None that I can think of, anyway. Pretty sure I was using it before MDNS was a thing.

[–] r00ty@kbin.life 1 points 4 months ago

They (the service that provides both web protection and logging) installs their own root certificate. Then creates certs for sites on demand, and it will route web traffic through their own proxy, yes.

It's why I don't do anything personal at all on the work laptop. I know they have logs of everything everyone does.

[–] r00ty@kbin.life 11 points 4 months ago

Well, it is kinda true. Many old games I had on my phone that were free and didn't have ads, in the last few years have received updates to do literally nothing, but include ads. So "these days" is the case for some.

[–] r00ty@kbin.life 3 points 4 months ago (4 children)

What if I told you, businesses routinely do this to their own machines in order to make a deliberate MitM attack to log what their employees do?

In this case, it'd be a really targetted attack to break into their locally hosted server, to steal the CA key, and also install a forced VPN/reroute in order to service up MitM attacks or similar. And to what end? Maybe if you're a billionaire, I'd suggest not doing this. Otherwise, I'd wonder why you'd (as in the average user) be the target of someone that would need to spend a lot of time and money doing the reconnaissance needed to break in to do anything bad.

[–] r00ty@kbin.life 104 points 4 months ago (27 children)

Sorry. I chose .local and I'm sticking to it.

[–] r00ty@kbin.life 5 points 5 months ago (1 children)

For clarification, my radio has inline fuses right at the start of the positive and negative wires. If you've ever seen wires melted into people's carpet because they didn't have a fuse on their hardwired car electrics... Yeah.

[–] r00ty@kbin.life 27 points 5 months ago (3 children)

https://www.alibaba.com/product-detail/12v-Dc-Hot-Plate-Cooktop-400W_1600610214693.html?spm=a2700.pccps_detail.0.0.346a13a0eHoBt1

Pros don't use the cigarette lighter!

I actually used to do something similar with my radio equipment. A bit much for the cigarette lighter (usually rated at 10a not 20). So I just parked the car, set up the aerial and wires straight to battery.

[–] r00ty@kbin.life 29 points 5 months ago

Yeah, I have a problem too! No, wait. It's because I don't have an X/Twitter/whatever account.

[–] r00ty@kbin.life 3 points 5 months ago

Thanks. That explains a lot of what I didn't think was right regarding the almost simultaneous failures.

I don't write kernel code at all for a living. But, I do understand the rationale behind it, and it seems to me this doesn't fit that expectation. Now, it's a lot of hypothetical. But if I were writing this software, any processing of these files would happen in userspace. This would mean that any rejection of bad/badly formatted data, or indeed if it managed to crash the processor it would just be an app crash.

The general rule I've always heard is that you want to keep the minimum required work in the kernel code. So I think processing/rejection should have been happening in userspace (and perhaps even using code written in a higher level language with better memory protections etc) and then a parsed and validated set of data would be passed to the kernel code for actioning.

But, I admit I'm observing from the outside, and it could be nothing like this. But, on the face of it, it does seem to me like they were processing too much in the kernel code.

[–] r00ty@kbin.life 6 points 5 months ago (3 children)

That's interesting. We use crowdstrike, but I'm not in IT so don't know about the configuration. Is a channel file, somehow similar to AV definitions? That would make sense, and I guess means this was a bug in the crowdstrike code in parsing the file somehow?

[–] r00ty@kbin.life 18 points 5 months ago (6 children)

I think it's most likely a little of both. It seems like the fact most systems failed at around the same time suggests that this was the default automatic upgrade /deployment option.

So, for sure the default option should have had upgrades staggered within an organisation. But at the same time organisations should have been ensuring they aren't upgrading everything at once.

As it is, the way the upgrade was deployed made the software a single point of failure that completely negated redundancies and in many cases hobbled disaster recovery plans.

view more: ‹ prev next ›