I love avocados, but can't say I've ever liquified them then drizzle on toast...
I thought this was gonna be some animorphs shenanigans from the thumbnail
It's just an NTP pool. The device is trying to update it's time. Likely it made many other requests to other servers when this one didn't work.
Maintaining up to date lists of anything is a game of whack a mole, so you're always going to get weird results.
If you're actually unsure, pcap the traffic on your pfsense box and see for yourself. NTP is an unencrypted protocol, so tshark or Wireshark will have no problem telling you all about it.
That said, I'd still agree with the other poster about local integration with home assistant and just block that sucker from the Internet.
I don't know how you got a picture of me, but I demand it is removed!
This is absolutely not what DNSSEC is. DNSSEC provides authenticity of the response, not privacy. You're describing a means of encrypted name resolution, like dns-over-tls, dns-over-https, etc.
If you have any question on truth worthiness, you can flash stock openwrt on them. You just lose out on their proprietary webUI and pre installed plugins. I believe their firmware is public on GitHub though.
Yeah, put that trash in prison!
That all sounds correct to me. The random port you're seeing in the logs is a high port, often referred to as an ephemeral port, and it is common for source ports. All good there.
Agreed. SMD components fail silently.
This is pedantic, but there are indeed capacitors there. They're all surface mount components, so they don't look like the caps that people typically talk about replacing, and they likely aren't what caused it to fail. Anything labeled on the board with a C## is likely a SMD capacitor.
😆 God the judiciary is fucked up...
I write a tech and radio blog, if that's your schtick. If not, no worries. Post your rss feed when you're done!
https://roguesecurity.dev/