• 0 Posts
  • 34 Comments
Joined 2 years ago
cake
Cake day: July 1st, 2023

help-circle


  • 404 is a web server response suggesting that a web server is up. It’s what’s giving 404.

    The web server can’t find your page or document or resource. So one of your web servers (on either the reverse proxy or the actual server) is pointing to the wrong spot on what to serve.

    You haven’t tried launching a wrong server on the same port right? Or misconfigured your nginx translation?

    Isolate the issue. Ignore nginx and start testing just the web server on the destination and see if the server is giving 404 and then if it is giving the right document then it’s nginx configuration. If it’s not giving you the document nginx can’t serve.

    But either way start isolating the problem into the smallest area. And focus on the configurations and files that are related to it.


  • You’re being naive. You’re probably not realising how common and well concealed depression is. Then when you see signs you’ve written it off as dark humour that can’t be legitimate feelings because their mask looks happy.

    When a coworker was doing the same I had a chat with him, starting the conversation about another friend of mine who had recently attempted suicide and how it was hard for me getting up at 2am to his partner calling me driving to his house and talking him down getting him help and how tired I was. My coworker opened up and told me he had nearly been on the edge too. Completely invisible to everyone at work.

    People try to normalise the thoughts that go through their head. Cope with humour and hide with acting normality and energy.

    People struggle. Almost everyone goes through depression at some time in their life. You’ll work with people who contemplate suicide and walk by unknowingly everyday.





  • I’m not an expert, but it sounds like if you finish a session of valorant, the anti cheat never unloads and continues to monitor memory and files.

    Easy Anticheat though, according so some sources, only runs during game play.

    Riots Anticheat has a bad history though. But both essentially are black boxes that send details both hash and samples back to their owners for them to approve what’s on it computer. Opened a medical record? It’s probably been hashed and sent back.

    Opened your employers accounting files when working from home? details you probably sent riot a copy.

    Both can be updated. There’s no guarantees that riot won’t do something nasty against a portion of high value targets. They know you from your payment details. They can identify, update the module and get anything they like, they have root.

    Anticheat has a history of being a tool for hackers. https://www.vice.com/en/article/hackers-are-using-anti-cheat-in-genshin-impact-to-ransom-victims/

    There’s no upside for the user. Mostly because they don’t work anyway.






  • I’ve worked with Windows environments from 2003 until still today migrating to azure. The biggest skills gap with technicians and engineers administrating Windows is actually networking. This single point connects every single service server and user and yet dns, dhcp, routing and it’s protocols, link layer technologies like vlans interface configurations aggregation and more is so poorly understood that engineers and technicians often significantly mistake problems. Almost all issues happen around network layers 2-4 or layer 8 (the end user).

    It doesn’t need to be first but no matter what os or component, networking is core and the single biggest return on investment for systems admin types.

    Sure other basic skills are required but just being able to test TCP by telnet or understand each hop, and is the server listening? What process ID is listening? Did someone configure rdp off 3389 and that’s why it doesn’t work? Was the host file edited and that’s why it’s resolving some old ip for this hostname? Why is it going out the wan interface of the router when it should be going over an ipsec tunnel?

    All this and more has nothing to do with Windows, and yet, anything that isn’t just user training or show and tell about how to do something, there’s a good chance it requires you to follow the networking layers to make sure behaviour is expected.




  • I don’t know where you work but don’t access your tailnet from a work device and ideally not their network.

    Speaking to roku, you could buy a cheap raspberri pi and usb network port. One port to the network the other to roku. The pi can have a tailscale advertised network to the roku, and the roku probably needs nothing since everything is upstream including private tailscale 100.x.y.z networks which will be captured by your device in the middle raspberri pi.

    I guess that’d cost like 40 ish dollars one time.



  • They could be, but I assume say like an apple device won’t install a ccp root authority unconditionally. Huawei and xiamoi probably could be forced, but the browser too, like Chrome, Firefox and safari need to also accept the device certificates as trusted.

    But the pressure in Europe would likely be to trade within Europe, you must comply.

    It fundamentally destroys the whole trust of PKI if this did go ahead. We just need to hope it does not.



  • A country for example could enact their mandatory certificate authority that they control. Then have ISPs who are in the middle use what was mandatory a trusted CA to act as the certificate issuer for a proxy. This already exists in enterprise, a router or proxy appliance is a mitm to inspect ssl traffic intercepting connections to a website say Google, but instead terminates that connection on itself, and creates a new connection to Google from itself. Since the Google certificate on the client side would be trusted from the proxy, all data would be decrypted on the proxy. to proxy data back to clients without a browser certificate trust issue, they use that already mandated CA that they control to create new certificates for the sites they’re proxying the proxy reencrypts it back to the client with a trusted certificate and browsers accept them.

    It’s actually less than theoretical, it’s literally been proposed in Europe. This method is robust and is already what happens in practice in enterprise organisations on company devices with the organisations CA certificate (installed onto organisation computers by policy or at build time). I’ve deployed and maintained this setup on barracuda firewalls, Fortigate firewalls and now Palo alto firewalls.

    https://www.itnews.com.au/news/eu-row-over-certificate-authority-mandates-continues-ahead-of-rule-change-602062