--- Log opened Wed Nov 15 00:00:54 2017 00:28 -!- oddball [~oddball@h96-61-175-66.lvrgtn.dsl.dynamic.tds.net] has quit [Ping timeout: 240 seconds] 00:31 -!- oddball [~oddball@h96-61-175-66.lvrgtn.dsl.dynamic.tds.net] has joined #se2600 00:57 -!- dfused [~dfused@c-24-19-29-152.hsd1.wa.comcast.net] has quit [] 01:29 -!- remoford1 [~remo_lapt@c-69-137-84-154.hsd1.tn.comcast.net] has joined #se2600 02:01 -!- eryc [~eric@unaffiliated/internetjanitor] has quit [Ping timeout: 276 seconds] 02:09 -!- eryc [~eric@internetjanitor.com] has joined #se2600 02:09 -!- eryc [~eric@internetjanitor.com] has quit [Changing host] 02:09 -!- eryc [~eric@unaffiliated/internetjanitor] has joined #se2600 02:09 -!- mode/#se2600 [+o eryc] by ChanServ 03:13 -!- sicsscam [~sicsscam@24.154.71.208] has quit [Read error: Connection reset by peer] 06:18 <@Dolemite> mr0ning, be0tches and h0ez! 06:59 * aestetix hugs Dolemite 07:20 * Catonic blinks 07:42 -!- remoford1 [~remo_lapt@c-69-137-84-154.hsd1.tn.comcast.net] has quit [Quit: Leaving.] 08:59 <@Mirage> i really hate dumb people. 09:00 <@Evilpig> yes 09:01 <@Mirage> security asshat at customer xyz is trying to claim that SNMP v3 with a configured login/pass is the only 'secure' and therefore safe way to perform SNMP _monitoring_ of a host. 09:01 <@Mirage> And of course the guys on our OS team that are being told this don't know any better and are accepting it. 09:04 <@Mirage> So I'm trying to impress upon them that for _monitoring_ there is no reason that RO access with host access restrictions for the configured community string using v1/2c isn't sufficient and that v3 would only really be a concern if they intended to allow Read/Write management. 09:05 <@Mirage> This is also coming from one of those companies who refuse to enable server firewalls and rely completely on their enterprise firewalls. 09:07 < xray> If the read only SNMP data is not encrypted then it servers no OPSEC purpose. 09:08 < xray> Are they requiring encryption? If not then v1/2 SNMP read only is sufficient as stated 09:08 < xray> defense in depth would also require host based firewalls 09:09 < xray> It sounds like the are all about check boxes and compliance and not about security 09:09 < xray> If they really want it done right they should us IPSEC to encrypt all traffic between machines and use host firewalls 09:09 <@shapr> security is the new theater major 09:10 < xray> LoL 09:10 < xray> What is interesting is that they can get decent OPSEC and it all be transparent to the usr 09:10 <@shapr> I just got a box from the ussr 09:11 <@shapr> IN-14 tubes 09:11 <@Mirage> are you fondling the users box' 09:11 <@Mirage> ? 09:11 <@shapr> heh, no 09:11 < xray> the idea is that when an attacker gets access to a system they are denied access to other systems and promiscuous mode gets them nothing 09:11 < xray> you bought vacuum tubes? 09:11 < xray> what are you building 09:11 <@shapr> nixie 09:11 < xray> ah 09:11 < xray> very nice 09:12 < xray> I hear they still make those 09:12 < xray> in Russia 09:12 <@shapr> I'd be surprised if that were true 09:12 <@shapr> I'd also be thrilled if that were true 09:12 <@shapr> prices keep going up 09:13 < xray> I recently read that they are making them but at the quantity the price needs to be much higher so as old stock is depleted the price will creep up 09:13 <@Mirage> there was an article on /. not too far back about how they were starting to manufacture tubes again in Russia 09:13 < xray> I think that is the one I read 09:14 < xray> of course it could be complete bunk 09:14 <@Mirage> whoa, you read /. too? Small world.. =P 09:14 < xray> http://www.daliborfarny.com/ 09:14 < PigBot`> Title: Nixie clocks at DaliborFarny.com | Nixie tube manufacturer (at www.daliborfarny.com) http://tinyurl.com/ha7rk55 09:14 <@shapr> google says this person was making nixie tubes http://www.daliborfarny.com/product/rz568m-nixie-tube/ 09:14 < PigBot`> Title: R|Z568M Nixie Tube | Nixie clocks at DaliborFarny.com (at www.daliborfarny.com) http://tinyurl.com/ycsq9wza 09:14 < xray> I read a lot of things to get threat inel 09:14 <@shapr> still, $145 each is a bit much 09:15 < xray> yeah, but can you put a price on how it looks 09:16 < xray> there will be someone who will pay that price because its "tubes" 09:16 < xray> I for one do not miss working with tubes 09:16 <@shapr> they look pretty :-) 09:17 <@shapr> I'd prefer to find some VFD "nixies" 09:17 < xray> 300 volt plate supplies are so much fun to work with. One slip and POW your sitting on the floor. 09:19 <@shapr> I heard rumors of VFD 'nixie' tubes, but I've never seen any 09:23 < xray> https://www.youtube.com/watch?v=Z_Ga15np_Lk 09:23 < PigBot`> Title: Know Your Displays - Nixie vs. VFD Tubes - YouTube (at www.youtube.com) http://tinyurl.com/zrswler 09:42 <@shapr> wow! 10:13 -!- mode/#se2600 [+o oddball] by ChanServ 10:24 -!- DrArkaneX [~doc@unaffiliated/drarkanex] has quit [Ping timeout: 248 seconds] 10:35 <@Catonic> xray: who needs promiscious mode? -p 10:36 <@Catonic> tcpdump -npi eth0 # all traffic addressed to host 10:36 <@shapr> xray: I subscribed to Fran's channel, that's some amazing content 10:36 <@shapr> too bad I'm at work and can't binge her videos 10:37 <@Dolemite> I once had a girlfriend that was stuck in promiscuous mode 10:37 * shapr blinks 10:38 <@shapr> I had a wife who did that, didn't stay wife for long. 10:38 < xray> Catonic: That is true. But the point of defense in depth is to prevent moving sideways and gaining intelligence on other systems once they get a foothold on a system. 10:40 < xray> Think of it as preventing the enemy from running amok and killing everybody if they manage to get inside the wire. (I'm referring to barbed wire around a fire base not a network "wire") 10:47 -!- DrArkaneX [~doc@unaffiliated/drarkanex] has joined #se2600 10:48 -!- dfused [~dfused@c-24-19-29-152.hsd1.wa.comcast.net] has joined #se2600 11:18 -!- DrArkaneX [~doc@unaffiliated/drarkanex] has quit [Ping timeout: 268 seconds] 11:30 -!- NotLarry [~NotLarry@c-98-193-255-199.hsd1.tn.comcast.net] has quit [Quit: Lost terminal] 12:24 -!- DrArkaneX [~doc@unaffiliated/drarkanex] has joined #se2600 12:45 -!- DrArkaneX [~doc@unaffiliated/drarkanex] has quit [Read error: Connection reset by peer] 15:44 -!- TheDukh [~thedukh@66-38-50-21.pool.dsl.duo-county.com] has joined #se2600 18:11 -!- K`Tetch_ [~no@24-178-141-147.dhcp.thtn.ga.charter.com] has joined #se2600 18:14 -!- K`Tetch [~no@unaffiliated/ktetch] has quit [Ping timeout: 248 seconds] 19:22 -!- Netsplit *.net <-> *.split quits: @Corydon76, @dasunt, aestetix, vaneck_ 19:23 -!- TheDukh [~thedukh@66-38-50-21.pool.dsl.duo-county.com] has quit [] 19:28 -!- Netsplit over, joins: @Corydon76, aestetix, vaneck_, @dasunt 20:05 -!- remoford [~remo_lapt@c-69-137-84-154.hsd1.tn.comcast.net] has joined #se2600 20:27 <@Dickie> I'm stuck in promiscuous mode 20:31 < dfused> arent we all 21:58 -!- remoford [~remo_lapt@c-69-137-84-154.hsd1.tn.comcast.net] has quit [Quit: Leaving.] --- Log closed Thu Nov 16 00:00:53 2017