[00:03:53] I love black, so I am happy [00:04:54] heh true, i like pitch black [00:55:27] [1/2] Welcome to the club, population: [00:55:28] [2/2] * Robert [00:59:08] You kids are just so spoiled. I grew up watching Television in Black and white, and then in 4 colours, and later 16 colours ..... You guys have NO IDEA how good you have it. [01:07:38] this discord update is fucking horrid [01:07:42] I can't be dealing with this omg [01:08:14] it do be like that [01:08:20] i got rid of that redundant title bar though [01:08:45] [1/2] it's... okay i suppose [01:08:46] [2/2] https://cdn.discordapp.com/attachments/615786602454581249/1354260738201485402/Screenshot_2025-03-26_at_12-08-27_Discord_offtopic_Miraheze.png?ex=67e4a518&is=67e35398&hm=9b42032ed6fc0611105fdbaa8f8f17ce2c3ed0d5ed0bef87c8f57a10d7974a5d& [01:09:07] what’s next instant digital cameras instead of careful film? /lh [01:12:13] https://cdn.discordapp.com/attachments/615786602454581249/1354261625892245606/history_06.png?ex=67e4a5ec&is=67e3546c&hm=261f4ebe0f5855d817f56fa0f7e0f67a8dcb70f7069756a2484b9e537e15d020& [01:14:36] Used to have such a camera [01:20:46] yeah [01:20:56] just leave well enough alone or at least let us revert [01:23:42] [1/2] ui update discussion [01:23:42] [2/2] i guess i get Darker Mode so that's a win but it's gonna take a while for me to get used to the squarification of everything [01:25:20] it got foured [01:25:45] i'm still on old ui until i restart my client (bad idea i will not be going thru with) [01:26:47] four numberblocks took over as the ui designer he said we have to rid of the Round Things /J/J/J/J [01:31:26] my client restarted itself lol [01:32:16] you can use vencord and disable the experiment to temporarily go back [01:32:19] wont last forever [01:41:38] whats the name [01:41:51] desktop visual refresh [01:44:59] oh neat [01:45:51] [1/2] we A/B testing the old chat input now? [01:45:51] [2/2] https://cdn.discordapp.com/attachments/615786602454581249/1354270092304847081/Screenshot_2025-03-26_at_12-45-25_Discord_Experiments_User_Settings.png?ex=67e4adcf&is=67e35c4f&hm=4b82125148a459ddbd3d4a88a8a46d51a7a0974a6d5aed9da3aa8993327e9a7b& [01:46:27] [1/2] > Current assigned to bucket 3 [01:46:27] [2/2] 10/10 grammer [01:47:27] [1/2] phew [01:47:27] [2/2] https://cdn.discordapp.com/attachments/615786602454581249/1354270494916083762/image.png?ex=67e4ae2f&is=67e35caf&hm=d205f08f16c3f0ee82da7130937e94882bfa8b0ebb8c2716f82e80be3f750d6b& [01:53:43] The new design feels too glass-like for my liking. [03:34:20] All is apps, all the way down [04:40:08] [1/11] anynyan here knows how to diagnose ipv6 skill issues? [04:40:09] [2/11] ``` [04:40:09] [3/11] > traceroute 2620:0:861:2:208:80:154:151 [04:40:09] [4/11] traceroute to 2620:0:861:2:208:80:154:151 (2620:0:861:2:208:80:154:151), 30 hops max, 80 byte packets [04:40:10] [5/11] 1 2403-4800-3202-de10--1.sta.iprimus.net.au (2403:4800:3202:de10::1) 46.011 ms 47.406 ms 47.378 ms [04:40:10] [6/11] 2   * [04:40:10] [7/11] 3   * [04:40:10] [8/11] 4   * [04:40:11] [9/11] 5   * [04:40:11] [10/11] [04:40:11] [11/11] ``` [04:46:02] What exactly is the issue ? [04:46:10] Are IP packets not arriving [04:46:11] Or [04:46:45] [1/2] i can't interact with gerrit.wikimedia.org at all [04:46:46] [2/2] can't establish a tcp connection and i don't get responses for icmp pings [04:46:48] can do on my server [04:47:25] Both IPv4 and IPv6? [04:47:30] only ipv6, ipv4 works fine [04:47:48] Does IPv6 work for other sites [04:48:07] not for miraheze.org (2606:4700::6812:7be) [04:48:37] nor for catgirl.center (2606:4700:3030::ac43:8e56) [04:48:44] Which network is this [04:48:47] Like [04:48:49] The LAN [04:48:52] or sharkgirl.ing (2a01:4f8:c012:afee::) [04:48:59] miaw? wdym [04:49:04] ^ [04:49:18] wdym the lan ^^; [04:49:34] Dummy, like, what's in-between your computer and the internet [04:50:20] a huawei HQ659 (if my eyes can read right) router going to a uhhh model i think (^^;) [04:50:36] And who owns it ? [04:50:39] Whose hole does it plug into [04:50:55] Is this at home? Or some coffee shop? Or maybe cellular network ? [04:51:00] A server in some datacenter? [04:51:01] at home yeah [04:51:08] There we go [04:51:11] ah [04:51:16] _that's_ what you meant ^^; [04:51:17] What's the home IAG [04:51:21] Yea u cute dummy [04:51:21] iag? [04:51:24] awubefiulawuifawbfeiulwafiulawileufwilbuef [04:51:25] The like [04:51:27] Box [04:51:35] That plugs into the ISP's hole [04:51:55] All-in-one router AP switch modem whatever thing [04:52:04] switch is in the router itself [04:52:07] Yes [04:52:07] router goes to a separate modem [04:52:14] Well switch can't be in a router [04:52:14] (i think) [04:52:16] You have a router [04:52:18] And a switch [04:52:20] Which can be one device [04:52:28] yeah that's what i meant x3 [04:52:38] Do u own the IAG box [04:52:51] Or does your ISP [04:53:14] dunno actually, i don't own it ^^; [04:53:44] i was hoping that i don't have to talk to People to figure it out [04:53:46] Is it ur place ? [04:53:51] i live here yeah [04:53:57] Like [04:54:00] but i don't handle the internet side of things [04:54:14] Is it the place that u always lived at I mean x3 [04:54:26] Well [04:54:31] uhhhh [04:54:31] Does it have a DHCP server [04:54:35] Like [04:54:37] it's complicited x3 [04:54:37] Yk what I mean [04:54:50] The place u are at since we met [04:54:53] (wait, how do i figure that out ^^;) [04:54:59] yeah :p [04:55:06] Well, are u debugging [04:55:10] What are you debugging [04:55:12] What device [04:55:16] Is the tracerotue from [04:55:23] my laptop [04:55:27] Well [04:55:33] Do u not know if u have a DHCP client running ? [04:55:33] 90% sure it's not my laptop, i can try hotspot to check [04:55:48] ah, i do dhcp yeah ^^; [04:55:59] x3 check what stuff it assigned u [04:56:06] On the int [04:56:07] does input from `nmcli` work? [04:56:14] I'd prefer the output of `ip a` [04:56:17] For the interface [04:56:21] That is pointing into the LAN [04:56:34] [1/17] ``` [04:56:34] [2/17] 2: wlp0s20f3: mtu 1500 qdisc noqueue state UP group default qlen 1000 [04:56:34] [3/17] link/ether 26:0b:ea:5b:d7:62 brd ff:ff:ff:ff:ff:ff permaddr e0:d0:45:c2:63:f7 [04:56:35] [4/17] altname wlxe0d045c263f7 [04:56:35] [5/17] inet 192.168.1.30/24 brd 192.168.1.255 scope global dynamic noprefixroute wlp0s20f3 [04:56:35] [6/17] valid_lft 64543sec preferred_lft 64543sec [04:56:36] [7/17] inet6 2403:4800:3202:de10:1d1e:d78d:2a01:b149/64 scope global temporary dynamic [04:56:36] [8/17] valid_lft 7057sec preferred_lft 3457sec [04:56:36] [9/17] inet6 2403:4800:3202:de10:8e17:33eb:5c90:be01/64 scope global dynamic mngtmpaddr noprefixroute [04:56:37] [10/17] valid_lft 7057sec preferred_lft 3457sec [04:56:37] [11/17] inet6 fd80:7d14:5097:d200:b14e:c4c7:19ff:399b/64 scope global temporary dynamic [04:56:37] [12/17] valid_lft 7057sec preferred_lft 3457sec [04:56:38] [13/17] inet6 fd80:7d14:5097:d200:bc5c:ed95:5df4:8601/64 scope global dynamic mngtmpaddr noprefixroute [04:56:38] [14/17] valid_lft 7057sec preferred_lft 3457sec [04:56:39] [15/17] inet6 fe80::47b6:35f4:89e:143a/64 scope link noprefixroute [04:56:39] [16/17] valid_lft forever preferred_lft forever [04:56:40] [17/17] ``` [04:57:59] What in the [04:58:16] Why do you have 5 IPv6 [04:58:17] sounds like it's an amazing configuration then x3 [04:58:36] i have no idea what the expected output is lmao, lemme check server [04:58:54] I'd expect one IPv4 and one IPv6, though you can get a subnet assigned [04:59:01] [1/13] ``` [04:59:01] [2/13] > ssh icecone ip a [04:59:02] [3/13] [snip snip] [04:59:02] [4/13] 2: enp1s0: mtu 1500 qdisc fq_codel state UP group default qlen 1000 [04:59:02] [5/13] link/ether 96:00:04:02:cb:79 brd ff:ff:ff:ff:ff:ff [04:59:03] [6/13] altname enx96000402cb79 [04:59:03] [7/13] inet 49.12.9.109/32 metric 1024 scope global dynamic enp1s0 [04:59:03] [8/13] valid_lft 81120sec preferred_lft 81120sec [04:59:03] [9/13] inet6 2a01:4f8:c012:afee::/64 scope global [04:59:04] [10/13] valid_lft forever preferred_lft forever [04:59:04] [11/13] inet6 fe80::9400:4ff:fe02:cb79/64 scope link proto kernel_ll [04:59:05] [12/13] valid_lft forever preferred_lft forever [04:59:05] [13/13] ``` [04:59:06] hmm yes, that is very cursed lol [04:59:15] This seems more normal [04:59:31] Are any of the IPs like [04:59:33] Manually assigned [04:59:37] In any case, uhh [04:59:41] Actually [04:59:42] all from dhcp i believe [04:59:44] How does IPv6 handle [04:59:46] LAN routing [04:59:48] Do we have like [04:59:49] ARPv6 [05:00:05] https://cdn.discordapp.com/attachments/615786602454581249/1354318970441699378/2025-03-26_15-59.png?ex=67e4db54&is=67e389d4&hm=23e807eade08c32aec50f8c50d30658bbf3a945e66d078f7976cebeb35f807bc& [05:00:07] I wanna see if the IAG has an IPv6 [05:00:19] Actually DHCP should send that [05:00:36] So uhh [05:00:38] What was the [05:00:42] ip route [05:00:52] The `default` entry [05:00:57] [1/6] ``` [05:00:57] [2/6] > ip route [05:00:58] [3/6] default via 192.168.1.1 dev wlp0s20f3 proto dhcp src 192.168.1.30 metric 600 [05:00:58] [4/6] 10.42.0.0/24 dev wg0 proto kernel scope link src 10.42.0.2 [05:00:58] [5/6] 192.168.1.0/24 dev wlp0s20f3 proto kernel scope link src 192.168.1.30 metric 600 [05:00:59] [6/6] ``` [05:01:18] ah, first line x3 [05:01:51] Hmm [05:01:54] This is cursed af [05:01:57] But like [05:02:06] If there's no `default` for IPv6 then I don't think [05:02:12] huh [05:02:24] `ip -6 route show` [05:02:35] It defaults to ipv4 and hiding ipv6 maybe [05:02:36] [1/8] ``` [05:02:37] [2/8] > ip -6 route show [05:02:37] [3/8] 2403:4800:3202:de10::/64 dev wlp0s20f3 proto ra metric 600 pref medium [05:02:37] [4/8] fd80:7d14:5097:d200::/64 dev wlp0s20f3 proto ra metric 600 pref medium [05:02:38] [5/8] fd87:dcb0:6877::/64 via fe80::c42:4605:a036:dbcc dev wlp0s20f3 proto ra metric 600 pref medium [05:02:38] [6/8] fe80::/64 dev wlp0s20f3 proto kernel metric 1024 pref medium [05:02:38] [7/8] default via fe80::1 dev wlp0s20f3 proto ra metric 20600 pref high [05:02:39] [8/8] ``` [05:02:42] Oh there we go [05:02:49] Can you send ICMP to `fe80::1` [05:02:49] uhhh idt fe80::1 is supposed to be default is it [05:02:54] Oh ? [05:02:59] Idk tbh x3 [05:03:05] [1/8] ``` [05:03:05] [2/8] > ping fe80::1 [05:03:06] [3/8] ping: Warning: IPv6 link-local address on ICMP datagram socket may require ifname or scope-id => use: address% [05:03:06] [4/8] PING fe80::1 (fe80::1) 56 data bytes [05:03:06] [5/8] ^C [05:03:07] [6/8] --- fe80::1 ping statistics --- [05:03:07] [7/8] 4 packets transmitted, 0 received, 100% packet loss, time 3086ms [05:03:07] [8/8] ``` [05:03:14] me neither x3 [05:03:14] Yea uhh [05:03:21] If you can't ping it [05:03:24] Then no wonder it's fucked [05:03:44] [1/11] ``` [05:03:44] [2/11] > ping fe80::1%wlp0s20f3 [05:03:44] [3/11] PING fe80::1%wlp0s20f3 (fe80::1%wlp0s20f3) 56 data bytes [05:03:45] [4/11] 64 bytes from fe80::1%wlp0s20f3: icmp_seq=1 ttl=64 time=2.02 ms [05:03:45] [5/11] 64 bytes from fe80::1%wlp0s20f3: icmp_seq=2 ttl=64 time=5.36 ms [05:03:45] [6/11] 64 bytes from fe80::1%wlp0s20f3: icmp_seq=3 ttl=64 time=4.95 ms [05:03:45] [7/11] ^C [05:03:46] [8/11] --- fe80::1%wlp0s20f3 ping statistics --- [05:03:46] [9/11] 3 packets transmitted, 3 received, 0% packet loss, time 2003ms [05:03:46] [10/11] rtt min/avg/max/mdev = 2.019/4.107/5.356/1.486 ms [05:03:47] [11/11] ``` [05:03:47] there we go [05:03:52] Oh god [05:03:56] Huh [05:03:59] Why [05:04:00] What [05:04:13] > ping: Warning: IPv6 link-local address on ICMP datagram socket may require ifname or scope-id => use: address% [05:04:25] Wtf x3 [05:04:29] Yea I'm not good at IPv6 [05:04:43] What happens if you like [05:04:45] Run nmap [05:04:47] On the IP [05:05:09] fe80::1? [05:05:17] The default [05:05:40] [1/8] ``` [05:05:40] [2/8] > nmap -6 fe80::1 [05:05:41] [3/8] Starting Nmap 7.95 ( https://nmap.org ) at 2025-03-26 16:05 AEDT [05:05:41] [4/8] Strange read error from fe80::1 (22 - 'Invalid argument') [05:05:41] [5/8] Strange read error from fe80::1 (22 - 'Invalid argument') [05:05:41] [6/8] Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn [05:05:42] [7/8] Nmap done: 1 IP address (0 hosts up) scanned in 0.04 seconds [05:05:42] [8/8] ``` [05:06:15] [1/2] according to wikipedia, [05:06:15] [2/2] > In computer networking, a link-local address is a network address that is valid only for communications on a local link, i.e. within a subnetwork that a host is connected to [05:06:23] so idt that'd help us reach external ipv6 devices x3 [05:06:32] I mean [05:06:37] Idk x3 [05:06:37] Like [05:06:40] In IPv4 [05:06:41] The way this works [05:06:56] DHCP gives you the `default` (gateway) route [05:07:06] And you ask over ARP for the MAC address [05:07:11] Then you send an ethernet frame to the switch [05:07:14] To that MAC address [05:07:15] ooh~ [05:07:22] (i'm doing wifi ^^;) [05:07:28] Same thing [05:07:31] ah okay [05:07:35] It's still MAC addressed [05:07:45] I think they still call em ethernet frames [05:07:48] It's still IEEE 802 [05:07:54] L2 [05:07:58] The L1 just differs [05:08:01] Wi-Fi vs Ethernet [05:08:19] I forgot the name of Ethernet cables [05:08:20] Oh well [05:08:29] is it cat? [05:08:30] or smth else [05:08:32] And inside you encapsulate the IPv4 packet aimed towards the [05:08:34] Like if you send [05:08:39] A packet to 8.8.8.8 [05:08:43] You first check over ARP [05:08:53] You check your subnets [05:09:03] Aka the [05:09:08] `inet` entries for the NICs [05:09:12] `ip addr` shows them [05:09:26] If none match, you go the `default` route [05:09:33] The IP for this one is fetched from DHCP [05:09:37] That gives you an IP [05:09:44] So you check the subnets once again [05:09:49] And the appropriate interface matches [05:09:51] So you ARP for the IP [05:10:08] That gives you a MAC address [05:10:09] ah oki x3 [05:10:22] (i was testing `curl --interface` on my four ipv6 addresses, still no result) [05:10:39] So you send a frame on that appropriate interface, encapsulating the packet with the Dst IP being 8.8.8.8 and the Dst MAC being the MAC that `arp` gave you [05:10:53] This is how it works on IPv4 [05:10:55] Idk about IPv6 [05:11:00] My ISP doesn't support IPv5 [05:11:09] As in, their routers just drop all IPv6 packets [05:11:13] ew [05:11:26] Other than this they are an actually good ISP [05:11:28] So eh [05:11:39] They are like, what an ISP should be lke [05:11:44] I give them money [05:11:46] They give me internet [05:11:49] Their internet doesn't die at random [05:11:57] Their internet doesn't block random shit [05:11:58] ah okay [05:12:00] Or ports [05:12:01] fair enough ^_^ [05:12:03] I have a static IPv4 [05:12:11] the temptation to punt my school's network [05:12:18] So this is a strict upgrade from likle [05:12:23] Vomidafone [05:12:32] 🤮afone [05:12:39] :puke:f*ne [05:12:42] Ahaha [05:12:52] Vodafone is the European Comcast [05:12:59] :DDDDD [05:13:07] idk about comcast x3 [05:13:12] Be glad [05:13:17] Vodafone like [05:13:17] i'll try [05:13:19] Scams people [05:13:22] oh great [05:13:24] Openly scams people [05:13:30] we also have vodafone here, but i don't use 'em :p [05:13:36] Be very glad [05:13:41] Anyway, back to the IPv6 shit [05:13:41] Uh [05:14:07] https://superuser.com/questions/621593/whats-ipv6-analogue-for-ipv4-arp-an-and-arp-who-has [05:14:08] Huh [05:14:22] `ip -6 neigh show` [05:14:50] [1/9] ``` [05:14:51] [2/9] > ip -6 neigh show [05:14:51] [3/9] fe80::c42:4605:a036:dbcc dev wlp0s20f3 lladdr e0:2b:96:8c:5a:bd router STALE [05:14:51] [4/9] fd80:7d14:5097:d200::1 dev wlp0s20f3 lladdr 80:7d:14:50:97:d2 router STALE [05:14:52] [5/9] fe80::3480:e4ff:fe70:4dde dev wlp0s20f3 lladdr 36:80:e4:70:4d:de STALE [05:14:52] [6/9] fe80::1 dev wlp0s20f3 lladdr 80:7d:14:50:97:d2 router REACHABLE [05:14:52] [7/9] fd80:7d14:5097:d200:1fc9:787f:ceee:e443 dev wlp0s20f3 lladdr 36:80:e4:70:4d:de STALE [05:14:52] [8/9] 2403:4800:3202:de10::1 dev wlp0s20f3 lladdr 80:7d:14:50:97:d2 router STALE [05:14:53] [9/9] ``` [05:15:01] It says that it's reachable huh [05:15:09] Well [05:15:32] Let's do a proper nmap [05:15:35] I forgot how to nmap [05:16:07] Something like `nmap -sV -vvvvv ` [05:16:15] I think you need the -6 yea [05:16:44] -sV is version prove [05:16:45] wihch ip? the fe80::1? [05:16:49] Ya [05:17:02] [1/13] ``` [05:17:02] [2/13] > nmap -sV -vvvvv -6 fe80::1 [05:17:02] [3/13] Starting Nmap 7.95 ( https://nmap.org ) at 2025-03-26 16:16 AEDT [05:17:03] [4/13] NSE: Loaded 47 scripts for scanning. [05:17:03] [5/13] Initiating Ping Scan at 16:16 [05:17:03] [6/13] Scanning fe80::1 [2 ports] [05:17:03] [7/13] Strange read error from fe80::1 (22 - 'Invalid argument') [05:17:04] [8/13] Strange read error from fe80::1 (22 - 'Invalid argument') [05:17:04] [9/13] Completed Ping Scan at 16:16, 0.00s elapsed (1 total hosts) [05:17:04] [10/13] Read data files from: /usr/bin/../share/nmap [05:17:05] [11/13] Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn [05:17:05] [12/13] Nmap done: 1 IP address (0 hosts up) scanned in 0.19 seconds [05:17:05] [13/13] ``` [05:17:07] honey i don't think it'll work [05:17:13] Try adding `-Pn` [05:17:34] [1/24] ``` [05:17:34] [2/24] Strange read error from fe80::1 (22 - 'Invalid argument') [05:17:35] [3/24] Strange read error from fe80::1 (22 - 'Invalid argument') [05:17:35] [4/24] Strange read error from fe80::1 (22 - 'Invalid argument') [05:17:35] [5/24] Strange read error from fe80::1 (22 - 'Invalid argument') [05:17:36] [6/24] Strange read error from fe80::1 (22 - 'Invalid argument') [05:17:36] [7/24] Completed Connect Scan at 16:17, 0.01s elapsed (1000 total ports) [05:17:36] [8/24] Initiating Service scan at 16:17 [05:17:37] [9/24] NSE: Script scanning fe80::1. [05:17:37] [10/24] NSE: Starting runlevel 1 (of 2) scan. [05:17:37] [11/24] Initiating NSE at 16:17 [05:17:38] [12/24] Completed NSE at 16:17, 0.00s elapsed [05:17:38] [13/24] NSE: Starting runlevel 2 (of 2) scan. [05:17:39] [14/24] Initiating NSE at 16:17 [05:17:39] [15/24] Completed NSE at 16:17, 0.00s elapsed [05:17:40] [16/24] Nmap scan report for fe80::1 [05:17:40] [17/24] Host is up, received user-set. [05:17:41] [18/24] Scanned at 2025-03-26 16:17:17 AEDT for 0s [05:17:41] [19/24] All 1000 scanned ports on fe80::1 are in ignored states. [05:17:42] [20/24] Not shown: 1000 filtered tcp ports (no-response) [05:17:42] [21/24] Read data files from: /usr/bin/../share/nmap [05:17:43] [22/24] Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . [05:17:43] [23/24] Nmap done: 1 IP address (1 host up) scanned in 0.26 seconds [05:17:44] [24/24] ``` [05:17:44] Sometimes shit just shits itself [05:17:47] Let's do a full port scan ig ? [05:17:54] ig? x3 [05:18:22] what flag? [05:18:29] LOL I ran nmap on my own VPS instance and I triggered the DDoS protection [05:18:33] `-p1-65535` [05:18:35] gg xDD [05:18:49] [1/27] ``` [05:18:49] [2/27] Strange read error from fe80::1 (22 - 'Invalid argument') [05:18:50] [3/27] Strange read error from fe80::1 (22 - 'Invalid argument') [05:18:50] [4/27] Strange read error from fe80::1 (22 - 'Invalid argument') [05:18:50] [5/27] Strange read error from fe80::1 (22 - 'Invalid argument') [05:18:50] [6/27] Strange read error from fe80::1 (22 - 'Invalid argument') [05:18:51] [7/27] Strange read error from fe80::1 (22 - 'Invalid argument') [05:18:51] [8/27] Strange read error from fe80::1 (22 - 'Invalid argument') [05:18:51] [9/27] Strange read error from fe80::1 (22 - 'Invalid argument') [05:18:52] [10/27] Completed Connect Scan at 16:18, 0.88s elapsed (65535 total ports) [05:18:52] [11/27] Initiating Service scan at 16:18 [05:18:52] [12/27] NSE: Script scanning fe80::1. [05:18:53] [13/27] NSE: Starting runlevel 1 (of 2) scan. [05:18:53] [14/27] Initiating NSE at 16:18 [05:18:54] [15/27] Completed NSE at 16:18, 0.00s elapsed [05:18:54] [16/27] NSE: Starting runlevel 2 (of 2) scan. [05:18:55] [17/27] Initiating NSE at 16:18 [05:18:55] [18/27] Completed NSE at 16:18, 0.00s elapsed [05:18:56] [19/27] Nmap scan report for fe80::1 [05:18:56] [20/27] Host is up, received user-set. [05:18:57] [21/27] Scanned at 2025-03-26 16:18:40 AEDT for 1s [05:18:57] [22/27] All 65535 scanned ports on fe80::1 are in ignored states. [05:18:58] [23/27] Not shown: 65535 filtered tcp ports (no-response) [05:18:58] [24/27] Read data files from: /usr/bin/../share/nmap [05:18:59] [25/27] Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . [05:18:59] [26/27] Nmap done: 1 IP address (1 host up) scanned in 1.15 seconds [05:19:00] [27/27] ``` [05:20:12] Huh [05:20:16] Do we hammer it like [05:20:24] Okay well [05:20:32] Either I am stupid or the router drops ICMP [05:20:36] Wait [05:20:36] No [05:20:44] I am too stupid for this [05:20:46] i don't even know what fe80::1 links to [05:21:04] It should link to the IAG [05:21:23] [1/11] ``` [05:21:23] [2/11] SCAN TECHNIQUES: [05:21:24] [3/11] -sS/sT/sA/sW/sM: TCP SYN/Connect()/ACK/Window/Maimon scans [05:21:24] [4/11] -sU: UDP Scan [05:21:24] [5/11] -sN/sF/sX: TCP Null, FIN, and Xmas scans [05:21:24] [6/11] --scanflags : Customize TCP scan flags [05:21:25] [7/11] -sI : Idle scan [05:21:25] [8/11] -sY/sZ: SCTP INIT/COOKIE-ECHO scans [05:21:25] [9/11] -sO: IP protocol scan [05:21:26] [10/11] -b : FTP bounce scan [05:21:26] [11/11] ``` [05:21:27] Here's the nmap scans [05:21:51] The @ interface thing bothers me [05:21:55] Idk if it's cuz `ping` is dumb [05:22:05] Or if there's some config issue [05:22:06] @ thing? [05:22:17] Dis [05:22:22] oh [05:22:35] at least it warned us? x3 [05:22:47] Oh right you might wanna play with wireshark [05:23:01] To see the outgoing packets [05:23:36] I'm too stupid for IPv6 so there's that [05:23:48] Once domi wakes up I'll ask them ig x3 [05:24:10] [1/2] https://forums.whirlpool.net.au/archive/96yz7lmz [05:24:10] [2/2] huh, interesting [06:23:32] I’ve been moving away from Chrome and towards the Vivaldi browser: http://www.vivaldi.com [06:23:42] one thing I really like is that they host their own fediverse instance so you have mastodon in the sidebar and all that if you want, it’s super customizable too [06:40:20] Is it open source [06:42:09] Doesn't seem like it [06:42:10] Bummer [06:42:35] There's still no decent browser out there [06:42:44] Also, Vivaldi is just Chrome [06:42:44] So [06:43:25] vivaldi is sure interesting, very old opera to me [06:43:36] Old Opera was fun [06:43:41] That was back when browsers actually tried [06:44:12] it was my first browser, then i got into firefox [06:44:43] yeah, chromium-ifaction of browsers is concerning [06:45:10] i was instantly repulsed by chrome lol [06:46:18] Haha [06:46:22] My first was [06:46:24] IE ig ? [06:46:27] Then FF [06:46:31] I used to use Chromium [06:46:33] Then switched to FF [06:46:38] I also used Opera a lot [06:46:39] For their VPN [06:48:14] [1/2] well, I got internet access only in 2010 [06:48:14] [2/2] prior that I ofc hang a bit in internet cafes, their computers were on win98 and yeah, w/ IE [06:49:04] [1/2] and none of my friends who had internet used IE lol [06:49:04] [2/2] either opera or firefox [07:43:00] there’s a reason for that [07:43:23] it’s actually done by most of the same people that did opera original before they got bought [07:44:41] well it’s a chromium fork [07:44:43] that's cool of them [07:45:25] not nearly as ass as chrome though, I would use a Firefox thing but less support for my extensions [07:51:09] Less support ? [08:01:32] yeah [08:01:48] most of the extensions I use are from like 2015 and don’t have Firefox versions [08:15:35] Just rewrite them [08:15:36] Smh [08:15:42] Tbh [08:15:51] FF and Chrome have essentially the same extension API [09:17:49] Hello folks. [09:18:08] I like Opera GX. It's nice. [10:25:00] Zen(FF fork) is nice, but still noticeably in beta [10:51:12] I still remember when we got the first TabBrowser in 2001 I believe. It was a drain on Windows 98 LOL But when it was fully loaded, it just ran smoothly (for that time then. You had to define those tabs in a separate .cfg file. Crazy [10:51:20] I would recommend Firefox, if it wasn't for their god awful new ToS. [10:51:30] You can try the Arc browser, or any Opera browser. [10:51:43] Opera GX!!!! [10:52:03] I don't really care much about ToS and privacy when it comes to the internet. [10:52:15] It is the internet. [10:52:23] Privacy doesn't exist. [10:52:28] Any content transmitted through Firefox can be used to train their AI model. [10:52:46] Privacy can exist if you use a TOR Browser, it's an anonymiser. [10:52:51] ToS wise. As long as it ain't like "You don't own what you paid for" like Ubisoft. [10:53:07] Your provider: "Guess we don't exist." [10:53:21] The provider know. [10:53:31] Sure they can see TOR Traffic, they can't understand or read it. [10:53:32] In fact. Most providers sell your data. [10:53:43] Bold claim. Don't you think? [10:53:58] That's like saying a nuclear physicist doesn't understand nuclear theory. [10:54:13] That's a terrible comparison. [10:54:31] I mean... Providers should be somewhat competent at their field/sector. [10:54:38] So to say they aren't... [10:54:45] The comparison makes sense. [10:54:49] Do you really want them to spend time decrypting everyones web traffic? [10:54:58] And do you think that is profitable for them. [10:55:15] They wouldn't have to decrypt manually? [10:55:28] I mean. In the Military. We decrypt using machines. [10:55:39] Some stuff already have pre-existing systems to decrypt. [10:55:48] In my sentence at any point, did I say manually. [10:55:56] That’s just modern software [10:56:17] Oh I read it wrong then. Apologies. [10:56:31] But I'm pretty sure decryption equipment should be universally available? [10:56:42] I mean. public-owned signal scramblers exist. [10:56:47] Well, you can't decrypt TOR traffic. [10:56:49] That’s not how encryption work [10:57:05] Unless you have someones device that sent out the TOR traffic requests, it's basically impossible. [10:57:13] SSL is "encrypted", but they can see that web traffic. [10:57:52] I took a quick crash course in Military intelligence so my basic understanding of encryption is "Decrypt them using a series of codes provided by Army Intelligence". [10:58:02] So plug it in, hit enter and let the machine sort it out for you. [10:58:25] Sometimes fancier stuff requires human interference. [10:58:42] But most of the time our intelligence equipment is heavily automated. [10:58:44] The point of encryption is only the people with the keys, the intended recipients, can read the message [10:58:48] Triangulation are crazy. [10:59:05] We are taught to decrypt RFs and triangulate encrypted gps channels. [10:59:12] You don't even need to have encrytped web traffic for it to be unencryptable, the Signal social media company is a prime example of this. [10:59:30] Do tell me more. [10:59:42] This is interesting. Genuinely. I'm not well-versed in this. [10:59:50] My experience with encryption, again. Is purely military experience. [11:00:00] Signal is anonymised, keeps no history, trasmits everything via a multitude of services so the web traffic is broken up, never transmitted together as the same packet. [11:00:05] I know how to triangulate an encrypted GPS frequency. [11:00:10] With the right equipment. [11:00:25] Near-peer training is wild. [11:00:25] Well, I'll be fine with my Nokia 3310. [11:00:55] But couldn't they still track you in real time? [11:01:10] Say, a recon team with a standard triangulator package. [11:01:16] Hooked up to your grid? [11:01:27] So as long as the device is connected to the net. It's traceable. [11:03:06] Nope, because you'd need to be able to understand what the packets are to know what you're tracing. [11:03:35] Man... No wonder those Army Intelligence guys are such nerds. [11:04:00] But let's say we have the package and information to track. We can, right? [11:04:05] And not all the packets will be transmitted at the same time or in the same packet, they will take various detours to reach you, TOR is not the fastest anonymising measure, but it works. [11:04:12] Cause that's how we decrypt stuff in the military too. [11:04:22] We obtain information of said network. [11:04:36] Not full, maybe just "Hey this is their name. Can you try to find them?" [11:04:46] And our triangulator does most of the work. [11:05:01] Well, if you have one packet, you'd need all of the others. If you had all the packets, it wouldn't tell you much either, you'd need to know how to assemble the packets and only the receiving client has the capability to do that. [11:05:09] https://signal.org/bigbrother/ signals response to supeonas [11:05:17] jack shit to give [11:05:27] So we can still drop a strike package on you? [11:05:43] Cause what the government usually need is the address, name and location. [11:05:43] Not sure, but it'd be hard. [11:05:50] Interesting. [11:06:24] Oh. Well that simplifies things. I was about to ask "So what makes terrorists not using this particular platform". [11:06:38] They probably also train intelligence officers in the military how to track their own system. [11:06:51] I know that cause we got plenty of tech contractors from tech companies. [11:06:56] There are probably some who do use it [11:06:58] Starlink, Google, Etc. [11:07:01] like the US government [11:07:06] :steamhappy: [11:07:35] I mean. They are paid to train us. Google, Microsoft, Dell, Intel. They all hang out at our training course for intelligence / cyber warfare. [11:07:50] Defence contractors run the defence industry. [11:08:33] Trust me. Defence industry is the most tolerant and progressive industry there is. [11:08:40] United in killing and making profit. [11:08:52] You can find Russian and American contractors working together. [11:08:57] Government and non-government. [11:09:00] Shit is just whack. [11:09:53] Also. Governments usually have their own system. [11:10:04] Ours in particular is just a glorified network of satellites. [11:10:16] And scramblers. [11:10:23] Scramblers are hillarious. [14:01:12] ok so yesterday i found out this guy is 20 years old and will be 21 in less than 3 months [14:01:20] i deadass thought he was like 16 [14:07:22] eh [14:10:24] also a different acquaintance of mine told me he literally hasn’t changed since he was like 12/13 which is. Extremely Embarrassing how can someone act the exact same as they were when they were that age [14:11:57] some just do not mature (much) [14:12:11] truly unfortunate [14:12:22] and interacting on the pc only can do that. [14:13:10] i was informed he was shittalking me behind my back in a server i wasn’t in and it was gen so embarrassing one of his arguments was the discord equivalent of “socialism is when no iphone” [14:17:00] he’d tried 2 manipulate said acquaintance in2 dropping the move idea and claimed he “didn’t know what oppression was” which was. utterly ridiculous considering the guy was the norm where he lives and the acquaintance in question was. Not [14:18:54] 2bf the 20 year old man who hasn’t changed his behavior since 2017 lives in a country with extremely high censorship (you can probably guess which) but. that’s not the same as being a minority [14:20:42] Well... I don't stand still with such types of individuals. If they don't want to grow, (or can't) I rather don't waste my time with that. [14:21:14] I'm taking a nap now.. 💤 [14:21:39] alrite, have a good one 👍 [19:35:18] opera’s nice, not really my style though [19:36:32] arc i do not like, it’s severely lacking in features and just seems like diet vivaldi ngl [21:39:47] > PS: I have ADHD. I don’t need anything to distract me because it all happens automatically [21:39:49] MOOD [21:47:27] most of the ToS business is frankly overblown on further inspection, and the idea that firefox/tos is a bad thing next to a recommendation of opera is a downright satire [21:52:36] [1/3] opera's cute, but lost their uniqueness years ago, now peddles glitter, and has anyone actually seen opera's privacy doc or TOS [21:52:36] [2/3] https://legal.opera.com/privacy/ [21:52:37] [3/3] https://legal.opera.com/eula/computers/ (among others) [22:06:52] [1/2] and for bonus, an alternative take that digs into the mozilla business [22:06:52] [2/2] https://thelibre.news/mozilla-has-better-lawyers-than-pr/ [23:12:36] [1/2] I cant say much because I do have access to confidential information with Mozilla, so I walk a fine line here. However, Mozilla definitely takes privacy seriously, even as someone that has access to non-public information, and telemetry data, I would never be able to figure out what data corresponded to which user. Mozilla’s lawyers are a pretty heavy force to be reckoned with, and the [23:12:37] [2/2] y do care about privacy on the internet, and keeping the internet accessible to all, they were huge supporters of keeping net neutrality years ago, and have continued to fight ever since