Toots for pitrh@mastodon.social account

Written by Peter N. M. Hansteen on 2025-02-01 at 14:45

[#]Google is for some reason not letting me sign in to reply to a comment on a 12 year old article of mine at bsdly.blogspot.com, so I'll put it here:

The newer and better article about #OpenBSD, packages and daily tasks is "You Have Installed OpenBSD. Now For The Daily Tasks." from 2024, https://nxdomain.no/~peter/openbsd_installed_now_for_the_daily_tasks.html (also available tracked and prettified, link within). #openbsd #packages #usability

=> More informations about this toot | View the thread

Written by Peter N. M. Hansteen on 2025-01-30 at 06:35

and for the record, that is not a useful spamtrap candidate, thanks for asking :D

=> More informations about this toot | View the thread

Written by Peter N. M. Hansteen on 2025-01-30 at 06:32

So this happened:

Jan 30 03:07:16 skapet sshd-session[94311]: Failed password for invalid user "> from 165.231.182.56 port 15613 ssh2

I wonder if we are seeing a variant of "gropefor database down, feeding raw html to the ssh gropebot" scenario again such as in https://nxdomain.no/~peter/so_somebody_is_throwing_html_at_your_sshd.html #sshgropers #sshd #passwordguessing #passwordgroping #passwords #cybercrime

=> More informations about this toot | View the thread

Written by Peter N. M. Hansteen on 2025-01-28 at 14:24

What, people are freaking out about #windows11 now?

That writing was already on the wall (in bold, italic, lots of !!!s) when I wrote this thing in 2021 - "The Impending Doom of Your Operating System Going to or Past 11, Versus the Lush Oasis of Open Source Systems" https://nxdomain.no/~peter/2021_wild_wild_world_of_windows.html about my then-new laptop and #openbsd support.

That machine is still quite usable with OpenBSD, thank you! #opensource #freesoftware #libresoftware (also https://bsdly.blogspot.com/2021/07/the-impending-doom-of-your-operating.html tracked, prettified)

=> More informations about this toot | View the thread

Written by Peter N. M. Hansteen on 2025-01-25 at 13:19

Finally, an industrial-scale "Single Packet Authentication" implementation - https://www.theregister.com/2025/01/25/mysterious_backdoor_juniper_routers/ #security #backdoors #portknocking #singlepacketauthentication #SPA

Reminds me of my own "Why Not Use Port Knocking" (2012) https://nxdomain.no/~peter/why_not_use_port_knocking.html (part of the Hail Mary Cloud sequence, summarized at https://nxdomain.no/~peter/hailmary_lessons_learned.html)

=> More informations about this toot | View the thread

Written by Peter N. M. Hansteen on 2025-01-23 at 08:09

Game of Trees 0.108 released https://www.undeadly.org/cgi?action=article;sid=20250123080808 #openbsd #gameoftrees #got #git #development #versioncontrol #freesoftware #libesoftware

=> More informations about this toot | View the thread

Written by Peter N. M. Hansteen on 2025-01-22 at 21:47

hm. I'm discovering that over there on the #butterflysite there is no such thing as "edit post"

=> More informations about this toot | View the thread

Written by Peter N. M. Hansteen on 2025-01-22 at 21:04

Is SPF Simply Too Hard For Application Developers?

The Sender Policy Framework (SPF) is unloved by some, because it conflicts with some long-established SMTP email use cases. But is it also just too hard to understand and to use correctly for application developers? https://nxdomain.no/~peter/is_spf_too_hard_for_appdevs.html

(2016 but still holds) #smtp #spf #mail #spam #antispam #security #openbsd #spamd

=> More informations about this toot | View the thread

Written by Peter N. M. Hansteen on 2025-01-22 at 20:44

New BSDNow episode out https://www.bsdnow.tv/594 - Name that Domain - featuring the BSDCan CFP (https://www.bsdcan.org/2025/papers.html) #bsd #bsdnow #bsdcan #callforpapers #netbsd #freebsd #openbsd #conference #freesoftware

=> More informations about this toot | View the thread

Written by Peter N. M. Hansteen on 2025-01-22 at 11:03

Following a recent discussion of email security over at Linkedin, I think perhaps my old but recently updated spam and malware countermeasures article is still worth reading if the subject is important to you - https://nxdomain.no/~peter/effective_spam_and_malware_countermeasures.html.

The reference section has pointers to a seemingly endless sequence of field notes related to these matters. The so far last entry is my New Year 2025 post "A Suitably Bizarre Start of the Year 2025" https://nxdomain.no/~peter/suitably_bizarre_start_of_the_year_2025.html #email #smtp #spam #malware #security

=> More informations about this toot | View the thread

Written by Peter N. M. Hansteen on 2025-01-20 at 09:55

A new Valuable News weekly from @vermaden is out - https://vermaden.wordpress.com/2025/01/20/valuable-news-2025-01-20/ - always a useful resource #bsd #freebsd #openbsd #netbsd #bsdnews #valuablenews

=> More informations about this toot | View the thread

Written by Peter N. M. Hansteen on 2025-01-20 at 06:43

Domain Name Scams Are Alive And Well, Thank You

Is somebody actually trying to register your company name as a .cn or .asia domain? Not likely. And don't pay them

https://nxdomain.no/~peter/domain_name_scams_are_alive_and_well_thank_you.html (or tracked, prettified https://bsdly.blogspot.com/2016/03/domain-name-scams-are-alive-and-well.htm)

As if there was ever any doubt. The original article is from 2016, but I updated it yet again today because another of those silly messages inboxed here.

[#]dns #domainnamescam #cndomainname.cn #cnnetworks.net

=> More informations about this toot | View the thread

Written by Peter N. M. Hansteen on 2025-01-18 at 12:56

This pufferfish video was posted to misc@openbsd.org - https://re5m.de/l/ballfish #openbsd #puffy #pufferfish - audio in Chinese as far as I can tell (list archive ref https://marc.info/?l=openbsd-misc&m=173719579930660&w=2)

=> More informations about this toot | View the thread

Written by Peter N. M. Hansteen on 2025-01-18 at 11:24

And ref previous toot, the 1006089th imaginary friend to join the collection at https://nxdomain.no/~peter/traplist.shtml is , mail.protection.outlook.com@bsdly.net following this sequence: https://nxdomain.no/~peter/blogpix/2025-01_18_johnson@vicglobalintelligence.com_to_mail.protection.outlook.com@bsdly.net.txt

The bots never cease to amaze #openbsd #spamd #greytrapping #antispam #cybercrime

And the two episodes combined proved addendum-worty, at least, see https://nxdomain.no/~peter/harvesting_the_noise_revisited.html

=> More informations about this toot | View the thread

Written by Peter N. M. Hansteen on 2025-01-18 at 10:53

Likely not blogworthy in itself, but #openbsd #spamd aficionados will get a light chuckle from hearing that some scraping and massaging relevant logs had the number of imaginary friends at https://nxdomain.no/~peter/traplist.shtml for our not-friends to play with roll past the one million mark in the early hours of today CET.

The recent update of https://nxdomain.no/~peter/harvesting_the_noise_revisited.html has links to more info. #spam #antispam #greytrapping #blocklists #cybercrime

=> More informations about this toot | View the thread

Written by Peter N. M. Hansteen on 2025-01-17 at 09:32

BSDCan 2025 Call for papers deadline 2025-02-12, conference 2025-06-11 - 2025-06-14

Here is your friendly reminder that it is still possible to submit your talk or tutorial submissions for the upcoming BSDCan 2025.

The conference website is up at https://www.bsdcan.org/2025/.

If you are interested in submitting a proposal, please go to the call for papers page https://www.bsdcan.org/2025/papers.html to get oriented.

Looking forward to seeing you in Ottawa!

[#]bsd #openbsd #freebsd #netbsd #development

=> More informations about this toot | View the thread

Written by Peter N. M. Hansteen on 2025-01-16 at 08:53

Stefano Martinelli's @stefano article about his EuroBSDCon 2024 experience has been published by the FreeBSD Journal and on the Foundation web site: https://freebsdfoundation.org/our-work/journal/browser-based-edition/virtualization-2/conference-report-my-eurobsdcon-experience-in-dublin/ (TL;DR: he enjoyed it a lot) #eurobsdcon #dublin #freebsd #openbsd #netbsd #libresoftware #sustainability #development #freesoftware

=> More informations about this toot | View the thread

Written by Peter N. M. Hansteen on 2025-01-15 at 19:44

BSDCan 2025 in Ottawa:

Tutorials: June 11-12, 2025

Conference: June 13-14, 2025

https://www.bsdcan.org/2025/

If you or your employer want to step up as a BSDCan sponsor, see https://www.bsdcan.org/2025/sponsorship.html for opportunities and sponsorship level options

[#]bsdcan #bsd #freesoftware #openbsd #netbsd #freebsd #development #libresoftware

=> More informations about this toot | View the thread

Written by Peter N. M. Hansteen on 2025-01-15 at 07:04

BSDCan 2025 in Ottawa:

CFP proposal deadline 12 February 2025 https://www.bsdcan.org/2025/papers.html

which sets the stage for

Tutorials: June 11-12, 2025

Conference: June 13-14, 2025

https://www.bsdcan.org/2025/

[#]bsdcan #bsd #freebsd #openbsd #netbsd #freesoftware #opensource #development #conference

=> More informations about this toot | View the thread

Written by Peter N. M. Hansteen on 2025-01-14 at 12:08

Should #blocklist maintainers be required to auto-expire entries and publish their policy on same?

I have repeatedly ranted on this, such as https://www.bsdly.net/~peter/traplist_ethics.shtml, https://nxdomain.no/~peter/maintaining_a_publicly_available.html,

as well as https://nxdomain.no/~peter/badness_enumerated_by_robots.html (best taken with a side of https://nxdomain.no/~peter/goodness_enumerated_by_robots.html).

I invite your comments. #security #spam #cybercrime

=> More informations about this toot | View the thread

=> This profile with reblog | Go to pitrh@mastodon.social account

Proxy Information
Original URL
gemini://mastogem.picasoft.net/profile/1331
Status Code
Success (20)
Meta
text/gemini
Capsule Response Time
418.941157 milliseconds
Gemini-to-HTML Time
7.62374 milliseconds

This content has been proxied by September (3851b).