• 0 Posts
  • 752 Comments
Joined 1 year ago
cake
Cake day: June 23rd, 2023

help-circle
  • I’m a network engineer and I run ipv6 natively in all of our datacenters. There are even a handful of end systems that have ipv6 native networking stacks with ipv4 sockets for our non-ipv6 compatible applications. IPv6 issues are basically self-inflicted at this point by companies that see their IT systems as cost centers, or by basilisk directors who’s knowledge stopped in the 90’s.


  • PowerCrazy@lemmy.mltoLinux@lemmy.mlSSH as a sudo replacement
    link
    fedilink
    English
    arrow-up
    26
    ·
    edit-2
    7 days ago

    Seems novel. But from a security aspect, if OpenSSH has security vulnerability that allows an unauthenticated user to login, via whatever means, once you are in the system as a non-privileged user, you are now free to use the same vulnerability to get root.

    Basically this exercise is like using two locks that have the same key to open them. If the same key opens them, then a weakness in one, is now a weakness in the other so why bother with two identical locks?



  • I dont’ understand the issue here. Is that picture part of some specific VPS’s logo or is it part of the title/theme of the article? I think it’s very poignant, though obviously edgy, if it’s the latter. If your VPS provider isn’t censoring content, then obviously that means Nazism will be able to exist along with militant socialism advocating violence against capitalism. That is kind of the point of the article right? To determine which VPS is actually not going to censor.









  • PowerCrazy@lemmy.mltoLinux@lemmy.mlHow terminal works
    link
    fedilink
    English
    arrow-up
    8
    ·
    1 month ago

    hahaah. Ok sure you win. Linux TTY’s are absolutely not terminals. Sure they are called terminals, they are for all intents and purposes modern-day terminals with a long and storied history that directly links them to terminals from the 70’s but since they aren’t a physical piece of hardware that electro-mechanically connects to a mainframe, obviously they aren’t really terminals and they should be be called something else.






  • Full tunnel using routing wouldn’t work but many full tunnel implementations use a shim where once the Tunnel is connected, the system route table isn’t referenced anymore, so you can put as many static routes etc as you want, but all traffic will hit the VPN interface before routing is done. For example Cisco any connect removes route look-up from the TCP/IP stack of the local system.