74
submitted 5 months ago by wgs@lemmy.sdf.org to c/unixporn@lemmy.ml
[-] wgs@lemmy.sdf.org 25 points 6 months ago

endlessh was pretty cool and a more modern version is even better ! I'll give it a shot !

On a side note, I found a way to trap HTTP connections too while working on my cyb.farm project. The go implementation is ridiculously simple: tarpit.go. It works by providing an endless stream of custom headers to the client, which it is supposed to ingest before getting to the content itself.

16
submitted 7 months ago* (last edited 7 months ago) by wgs@lemmy.sdf.org to c/mechanicalkeyboards@lemmy.ml

Hi everyone! I'm planning on getting a split keyboard to replace my planck, but I don't have a soldering iron.

What are my options ? Ideally I want:

  • DIY, no soldering involved
  • QMK firmware
  • 40% format

The keyboard I'm leaning toward is the let's split as it's a planck split in two halves, but it seems that you need to at least solder the keycaps yourself, which I can't.

[-] wgs@lemmy.sdf.org 31 points 8 months ago

I tried but got an error:

:& : Command not found

Is it expected ? Did I type something wrong ? I'm confused...

23
submitted 11 months ago by wgs@lemmy.sdf.org to c/france@jlai.lu
121
submitted 11 months ago by wgs@lemmy.sdf.org to c/linux@lemmy.ml

I've been working on this project for over a year now, and I'm sure many people here will like it !

This is a game where the player must complete technical challenges about various technologies (programming, cryptography, networking, etc...) to progress through the story. It puts the Unix family under the light, and features many opensource technologies all running on a single server!

Check out the about page for details, and happy hunting !

23

Over the past year, I've created technical adventure for people eager to challenge their skill and knowledge about many technical fields, while also having fun !

Programming, version control, command line, network protocols, cryptography, steganography, games, … Thorough the game you'll switch from decades old to state of the art technologies, and use it all to progress through a dystopian story happening around the 2^nd^ Epochalypse.

Get your systems ready, and hope that you'll be done with it before the Advent of Code starts, because you will probably not handle both at the same time ;)

1
Cyb3r Hunt (lemmy.sdf.org)
submitted 11 months ago by wgs@lemmy.sdf.org to c/cybfarm@lemmy.sdf.org
1
submitted 11 months ago* (last edited 11 months ago) by wgs@lemmy.sdf.org to c/cybfarm@lemmy.sdf.org

Until the hunt opens, check out the Guest book !

82
Feeling floppy today ? (lemmy.sdf.org)
submitted 1 year ago by wgs@lemmy.sdf.org to c/unixporn@lemmy.ml

CYB3R HUNT is an epochalyptic online adventure of which you are the hero! Check out the about page, the rules, and prepare for the opening on the 31^st^ of october !

Artworks are made by prahou, creator of the unix_surrealism universe (check out his mastodon account for the image on the background, and more quality content!).

As for the programs running :

  • window manager: glazier & wmutils
  • terminal: st
  • web browser: firefox (with borders removed for better visual effect)
  • irc client: irssi
  • image viewer: lel
  • widgets: lemonbar
1
Signed epochalypse (lemmy.sdf.org)
submitted 1 year ago* (last edited 1 year ago) by wgs@lemmy.sdf.org to c/cybfarm@lemmy.sdf.org

On the 19th of January [...] The admin team was helpless. In the split of a second, the whole CYBFARM network went down. Every subsystem on the planet stopped, and there was nothing they could do against it. The CYBFARM has always been autonomous, and nobody had enough knowledges of its internals to debug or fix anything.

Hopefully, a few minutes later, the first system came back up: the security module. Then other subsystems rebooted one after the others, and the production of goods restarted as expected.

We later found that an overflow occurred in the system clock. This caused a disruption of the internal message bus of the CYBFARM, which entered a locked state, and shut itself down to prevent harming the subsystems. The CYBFARM eventually found and patched the bug automatically, without any external intervention from our part. This was the first time in History that [an autonomous system] healed itself without human action!

This is such a major milestone in History!

Agatha Zieg-Movnieski
Epochalypse incident report

artwork: @pmjv

1
Security Mod (lemmy.sdf.org)
submitted 1 year ago* (last edited 1 year ago) by wgs@lemmy.sdf.org to c/cybfarm@lemmy.sdf.org

Case stared at the old laptop.

Is it broken ?

Molly closed the lid, and put it next the others, all destroyed by the CYBFARM security module.

There must be a way to bypass it...

artwork: @pmjv

[-] wgs@lemmy.sdf.org 31 points 1 year ago

Tabs for indent, spaces for alignment. This is the way, I can't believe people are still fighting that ?

[-] wgs@lemmy.sdf.org 43 points 1 year ago

Because other people might have restricted environment which might not suit their preference is not a good reason to level it down IMO.

Also, I think 9 is the best size for indent (matter of preference), do you think I should switch to space so everyone can enjoy this wonderful view I have ?

[-] wgs@lemmy.sdf.org 56 points 1 year ago

Weight your words my friend! GNU's a behemoth !

GCC alone is almost as big as Linux. Add core/binutils, the Hurd, ... And you easily outclass the kernel itself !

~ $ du -sh linux-6.4.12/ gcc-13.2.0/                    1.5G    linux-6.4.12/                                   1.1G    gcc-13.2.0/

Oh, and Emacs.

[-] wgs@lemmy.sdf.org 27 points 1 year ago* (last edited 1 year ago)

IPv4 and IPv6 are two different network stacks. Your IPv4 stack is hidden behind wireguard, but not the IPv6 one.

The correct way to fix your issue is to setup a second witeguard tunnel for IPv6, and route IPv6 traffic through it.

Edit: many comments advise to block outbound IPv6 traffic. Don't do that! It will add latency to all your requests as you will have to wait for them to timeout.

[-] wgs@lemmy.sdf.org 23 points 1 year ago* (last edited 1 year ago)

I'm reading all the comments and I'm shocked... In France, with uncapped access and 1Gbps down/600Mbps up (theorical) I pay 40€/mo (30€ every six month when I call to complain that it's too expensive). And it's definitely not the cheapest provider.

That's insane !

11

I used to rock a bare metal 1Tib HDD server for 17€/month, that I used as an NFS server for all my other servers which needed storage space.

First of all, NFS kinda sucks and I'm looking for alternative solution that I can use on OpenBSD to mount remote volumes.

Secondly, I'm planning to move this server to hetzner (my current provider), but they lack affordable storage (it's 50€/month for 1Tib). Do you know an hosting provider which would provide high volumes for not so expensive prices ?

[-] wgs@lemmy.sdf.org 24 points 1 year ago

I get what you say, and you're definitely not wrong to do it. But as I see it, you only saved ~80Kib of ingress and a few lines of logs in the end. From my monitoring I get ~5000 failed auth per day, which account for less than 1Mbps average bandwidth for the day.

It's not like it's consuming my 1Gbps bandwidth or threatening me as I enforce ssh key login. I like to keep things simple, and ssh on port 22 over internet makes it easy to access my boxes from anywhere.

2
RDP Traps ? (lemmy.sdf.org)
submitted 1 year ago* (last edited 1 year ago) by wgs@lemmy.sdf.org to c/cybersecurity@sh.itjust.works

I've recently dug into my firewall logs and the most traffic I seem to receive from internet is targeting port 3389.

While I could just blacklist the source IPs and call it a day, I would like to actually listen on this port and "trap" them in a fake RDP connection.

There are tools like endlessh, and I've found that you can do the same for http by sending an endless stream of headers. I would like to do the same for RDP, and before I start digging into the whole spec, I was wondering if there is already something similar for RDP.

Is anyone aware of that ? Is that even a thing ?

[-] wgs@lemmy.sdf.org 25 points 1 year ago* (last edited 1 year ago)

Congratulations! A mail server is quite demanding in terms of initial setup, but it's also very rewarding !

Here are a few pointers I can give you:

  • Using a good domain is important, some provider block entire TLDs for cheap domains (eg. .tk or .pw). I learnt it the hard way...
  • Set your MX records to A records, not CNAME
  • Ensure your PTR records match your A records for the mail server
  • Learn about SPF and DKIM
  • Set them up, and verify with mxtoolbox
  • Use the ip4:<ipv4> and/or ip6:<ipv6> selectors for SPF
  • Setup a spamfilter (I like spamassassin)
  • Leave it all running for a few weeks/months
  • Publish a DMARC policy on your DNS, and verify with mxtoolbox

This should limit a lot your likeliness to end up in spam folders (which is usually the hardest part about running your mail server)

[-] wgs@lemmy.sdf.org 28 points 1 year ago

You don't need to access a .onion instance to use Tor. You can simply perform your day-to-day web usage through Tor directly.

On your phone, you can even use Tor natively with most of your apps.

[-] wgs@lemmy.sdf.org 59 points 1 year ago

ELI5

So it's saturday afternoon, a very hot one, so you ask your daddy for an ice cream (hosted service). The shop you go in is very bizarre though, as there is one vendor (TCP port) for each flavor (docker service/virtualhost). But it's tricky because they're all roaming in the shop, and you don't know who's responsible for each flavor. Your dad is also not very comfortable paying these vendors directly because they only accept cash and do not provide any receipt (self-signed certificate/no TLS).

Hopefully, there is the manager (reverseproxy) ! This girl is right where you expect her: behind the counter (port 80/443), accept credit cards and has a receipt machine (Domain name + associated certificate). She also knows everyone on her team, and who's responsible for each flavor !

So you and your dad come to see the nice lady, ask for a strawberry + chocolate ice cream, and pay her directly. Once done, she forwards your request directly to the vendors responsible for each flavor, and give you back your ice cream + receipt. Life is good, and tasty !

[-] wgs@lemmy.sdf.org 22 points 1 year ago

Don't even bother with a SWAP partition. Create an empty file on your / partition so you can grow/shrink it as needed.

did if=/dev/zero of=/SWAP bs=1024m count=4
mkswap /SWAP
swapon /SWAP
view more: next ›

wgs

joined 1 year ago
MODERATOR OF