--- Log opened Fri Feb 15 00:00:14 2019 00:29 -!- fie [~fie@38.124.1.226] has quit [Quit: Leaving] 06:49 <@Shadow404> fucking case sensitive access lists in cisco ios. 06:50 <@Shadow404> an engineer escalated a priority ddos like ticket, only to find, he didnt capitailize a letter 'l' inthe named acl. hard as shit to pick out with a quick glance. 06:50 <@Shadow404> had me stumped for 5 min 07:06 <@Dolemite> mr0ning, be0tches and h0ez! 07:12 * aestetix hugs Dolemite 08:17 <@Corydon76> Dolemite: my sincerest condolences. I just heard on Facebook. 08:18 <@Corydon76> Dolemite's son took up the bugle. 08:19 <@Dolemite> As good as he is at the Tuba, I don't except the cacophony of out-of-tune sounds to last too long 08:20 <@Dolemite> He took it to school this morning because his band director is an Eagle and offered to act as his Merit Badge Counselor for it 08:20 <@Dolemite> Within a week I'll likely hear scales on it 08:20 < aestetix> Corydon76: could be worse. Could be bagpipes. 08:21 <@Corydon76> Unfortunately, I don't think there's a Bagpipes Merit Badge. 08:22 <@Corydon76> I'm told, though, that it takes TREMENDOUS lung power to master the bagpipes. 08:22 <@Corydon76> From a professional musician and world-famous composer, no less. 08:22 <@Dolemite> There's a Music merit badge in which you can choose what instrument to use 08:23 <@Dolemite> So you could, indeed, choose bagpipes. Or steel drums. Or a jug band. 08:38 < xray> What about a synth? Sonic Pi http://sonic-pi.net/ 08:38 < PigBot> Sonic Pi - The Live Coding Music Synth for Everyone (at sonic-pi.net) http://tinyurl.com/o9dgl7x 08:57 < Evilpig_> https://www.indeed.com/viewjob?jk=70b4bd14552ec9be&q=linux+administrator&l=Nashville,+TN&tk=1d3omaotu3cu7810&from=ja&alid=57470542e4b0d3b9ce0efbd8&utm_campaign=job_alerts&utm_medium=email&utm_source=jobseeker_emails&rgtk=1d3omaotu3cu7810 08:57 < PigBot> Application Server Administrator - Nashville, TN - Indeed.com (at www.indeed.com) http://tinyurl.com/y3amjmxl 09:10 < Evilpig_> "Frequent: Fingering" 09:29 <@Mirage> https://www.youtube.com/watch?v=EbMfnxB-XL4 09:29 < PigBot> total idiots at work(funny) (at www.youtube.com) http://tinyurl.com/y7vd2jm3 11:30 <@dasunt> What's a good CYA source for password policies? Found the NIST's guidelines, which seems good ("well the federal government says to do it this way..."), but looking for others. 11:36 <@Mirage> does it really matter? it's not like it'd be followed there anyway 12:00 < xray> The NIST password policy is the one referenced in NIST 800.171 so I don't think any regulatory organization would fault your for following it. https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-171.pdf 12:00 < PigBot> None (at nvlpubs.nist.gov) http://tinyurl.com/y6nsscdj 12:10 <@Corydon76> dasunt: we've standardized on LastPass for password management, and provide all of our employees with Yubikeys on their keychains, for 2FA. We encourage them to use random passwords using all 4 character banks, with at least 20 characters (or whatever the maximum is, if the site supports less). 12:11 <@Corydon76> And we additionally encourage them to use LastPass not just for company use, but also for personal use. 12:11 < xray> Corydon76: that is what I do except I use KeePass. 12:12 < xray> That process meets NIST requierments 12:12 <@Corydon76> If you're accustomed to using random passwords across everything in your daily life, you're more likely to not "forget" to secure any particular company login. 12:12 < xray> actually it exceeds the requierments 12:12 < xray> I never reuse passwords 12:13 <@Corydon76> No, but I mean in terms of encouraging the less technical employees to also use those practices 12:14 <@Corydon76> While I won't say that the technical employees never screw up, it's usually the nontechnical employees who are more apt to use easy-to-guess passwords. 12:14 <@dasunt> xray: I use KeePass as well. 12:14 <@dasunt> So I looked up PCI DSS, and their minimum requirements are seven character alphanumeric passwords changed every 90 days. 12:15 <@Corydon76> Another good reason to outsource PCD collection. 12:16 < xray> When I do a training class I tell them that if they can learn to use a password manager correctly (much easier than using Microsoft Word) then the will make it so difficult for an attacker that if they want their passwords they will have to resort to rubber hose crypt analysis. 12:16 <@Corydon76> I don't think our customer passwords are ever changed. 12:16 <@Corydon76> Nor would I characterize any of the customer passwords I've seen as "robust". 12:18 <@Corydon76> I have a tool for customer service that collects data every time someone enters a password incorrectly. No "correct" passwords are stored, just wrong attempts. 12:19 <@Corydon76> Customer service can then provide better support to customers when they say their passwords aren't working. 13:22 <@dasunt> That seems dangerous. 13:23 <@dasunt> When someone mistypes their password and your log shows something like "mayfloer1!", it's pretty easy to guess the password. 13:25 < Evilpig_> https://www.wpsdlocal6.com/2019/02/15/local-high-school-fishing-coach-charged-with-sex-offenses 13:25 < PigBot> Local high school fishing coach charged with sex offenses (at www.wpsdlocal6.com) http://tinyurl.com/y2t8lres 13:25 <@dasunt> Fishing coach? 13:25 < Evilpig_> I posted this in our random channel for work chat and someone said "a fishing coach that uses jailbait..." 13:26 < Evilpig_> I'm from that area and i've never heard of a fishing coach before, that was a very wtf moment 14:01 <@dasunt> I didn't know schools had them. 14:01 < xray> I didn't even know that was a thing. 14:02 < xray> My Dad showed us how to fish and the rest was up to us to learn. 14:02 < xray> It is sad if kids need a coach to learn to fish 14:03 < xray> I just did a google search and apparently fishing coaches are a real job. 14:03 <@dasunt> Do schools have hunting coaches as well? 14:03 <@dasunt> Boating coaches? Camping coaches? Gardening coaches? 14:06 < Evilpig_> we had a hunting coach when I was in middle school, but his title was "ag teacher" or "shop teacher" 14:08 <@dasunt> LOL, lets see if this works - just requested that my credit card up my limit to $5k. 14:09 <@dasunt> On a card I barely use. 14:10 <@dasunt> Hoping they do, beause if they do, I'm going to transfer some of my savings to a high-interest online savings account and use the card as a buffer for any emergencies. 14:17 <@dasunt> Will not be surprised if they don't. 14:29 <@Mirage> I thought it was funny...and counterproductive to intended use...when my bank bumped the limit on my $1k limit card that I had almost exclusively for use with places I didn't trust to $6300...and now I think it's been bumped again to something like $12k 14:31 <@Mirage> Defeats the purpose of wsnting a low-limit hard to use for one-off or potentially sketchy online purchases so that if the number is compromised they wouldn't be able to do much with it and damages would be minimized. 15:47 <@dasunt> LOL. 15:47 <@dasunt> I think by default, Amazon gave me a pretty good limit. 15:49 <@dasunt> But I pay my balances off every payday, so... 19:23 -!- strages [uid11297@gateway/web/irccloud.com/x-ejtrywbbmwbmgpnd] has quit [Quit: Connection closed for inactivity] 21:01 -!- LastChild [LastChild@c-68-53-5-70.hsd1.tn.comcast.net] has joined #se2600 21:01 -!- mode/#se2600 [+o LastChild] by ChanServ 21:42 -!- LastChild [LastChild@c-68-53-5-70.hsd1.tn.comcast.net] has left #se2600 [] 21:42 -!- LastChild [LastChild@c-68-53-5-70.hsd1.tn.comcast.net] has joined #se2600 21:42 -!- mode/#se2600 [+o LastChild] by ChanServ 23:41 -!- LastChild [LastChild@c-68-53-5-70.hsd1.tn.comcast.net] has quit [Ping timeout: 246 seconds] 23:41 -!- NotLarry [~NotLarry@c-68-53-121-109.hsd1.tn.comcast.net] has quit [Ping timeout: 246 seconds] 23:41 -!- ^020d [~^020d@108-192-158-126.lightspeed.tukrga.sbcglobal.net] has quit [Ping timeout: 246 seconds] 23:41 -!- NotLarry_ [~NotLarry@c-68-53-121-109.hsd1.tn.comcast.net] has joined #se2600 23:42 -!- LastChild [LastChild@c-68-53-5-70.hsd1.tn.comcast.net] has joined #se2600 23:42 -!- mode/#se2600 [+o LastChild] by ChanServ 23:52 -!- ^020d [~^020d@108-192-158-126.lightspeed.tukrga.sbcglobal.net] has joined #se2600 --- Log closed Sat Feb 16 00:00:16 2019