You have to open with “Chugga Chugga Choo Choo, we’re all gonna run a train on you!” Or it’s just a plain ole gangbang.
You have to open with “Chugga Chugga Choo Choo, we’re all gonna run a train on you!” Or it’s just a plain ole gangbang.
Seems like Twisted Metal meets Mario Kart.
Full tunnel would not mitigate this attack because smaller routes are preferred over larger ones. So, sure, 0.0.0.0/0 is routed over the tunnel, but a route for 8.8.8.8/32 pointing to somewhere layer2 adjacent, pushed via DHCP option 121, would supercede that due to being more specific.
The Killswitch only checks that VPN is up, not whether traffic is correctly routed over it.
You aren’t wrong, per se, I think you just don’t fully grasp the attack vector. This is related to DHCP option 121, which allows routes to be fed to the client when issuing the ip address required for VPN connectivity. Using this option, they can send you a preferred default route as part of the DHCP response that causes the client to route traffic out of the tunnel without them knowing.
E. It would likely only be select traffic routing out of the tunnel. I could, for example, send you routes so that all traffic destined for Chase Bank ip addresses comes back to me instead of traversing the tunnel. Much harder to detect.
Also used to track ransom notes, etc.
Engineering is engineering. You design it, you build it, you test it. Engineering. We shouldn’t gatekeep words.
With that said, I recognize that certain engineering disciplines have overlap with public safety, and should come with some qualifications to back it up.
After spending a few minutes mulling it over, I’ve realized the only right move is for me to sell the cube to someone more clever than myself.
Can I only teleport back to where I teleported in from, or can I teleport out of the cube to anywhere I want?
Why didn’t you stick with 3% peroxide to clean it, out of curiosity? Just none available, or am I the only crazy person who does this from time to time?
It probably has to do with being native ipv6 and needing to ride a 6to4 nat to reach the broader internet.
Start at 1400 and walk the MTU down by ~50 until you find stability, then id creep it back up by 10 to find the ‘perfect’ size, but that part isn’t really needed if you’re impatient. :)
E. I found 1290 was needed for reliable VPN over an ATT nighthawk hotspot.
Your VPN doesn’t have the ability to strip user agent strings on HTTPS requests, this doesn’t seem VPN related imo.
For what it’s worth, I did specifically say ecosystem because the TPM is just one component, which is required to authenticate the remote wipe. Also the drivers are installed automatically with most modern operating systems, it’s not like you install your own south bridge driver, for example. Linux of course notwithstanding.
I’ve seen it used successfully numerous times. Someone steals one of our laptops, rips the drive out, installs vanilla windows, and boom it reboots and performs a wipe.
Regardless, system-on-a-chip are just that, systems; they can absolutely make remote calls without user interaction, just as intimated by the comment you originally replied to.
That really isn’t entirely true anymore since the TPM ecosystem came into existence. I can remotely wipe any pc at my company even if it’s stolen and reformatted because a hardware chip will phone home the second a compatible os is installed and internet access is available.
That’s where the term “chain smoking” comes from, one after another all day long.
Fwiw, most modern thermostats have an emergency failsafe temp setting that will always turn the heater on when reached, even if inadvertently set lower by mistake. Saved my bacon in a rental once.
I hope I don’t get flayed for saying this, but I actually had this problem on Windows once, and it turned out to be thermal throttling of the CPU. I was going from 4+ghz to around 200mhz and then it would shoot back to normal. Just needed a thorough cleaning of the fans and ducting.
Thought it was worth mentioning on the off chance it might help someone.
Wow. I’d get the marshmallows out so I don’t have to get roasted alone.
A lot of negativity around Ubiquity in here, which is surprising to me, honestly. I had their USG for years and loved it, recently swapped it out for the Dream Machine and love it. Really don’t understand the complaints about linking it to the cloud. I just didn’t bother, everything works fine. Additionally, I managed to get a Debian container running on it and installed ntopng, it’s been awesome for getting realtime visibility into my network traffic.
E. I should add I have 6 of their switches and 3 access points, one of which is at least 7 years old and still receiving updates.