Security question

I know what SEO is, all the tricks of it and looked up Link Scoring before I wrote one word after your post.
English slipping a bit, sentence not making sense, sorry!

You'll probably see that a lot. In this instance I merely left out the "s" in "is":

"It does list a thread from May, which is when the one I referenced was started, but not that one.

Just me being more anal than a compiler: it's "antiquated". Responding to the sentence itself: Forget the masses, it's like that at the top, too.
I was talking about history revisionist and the people at Bizarro world in particular. Logic is their Kryptonite and I was cast out before their dimension collapsed in on them. More to come on that.

So, you're sinking to spelling errors as the only way you can get a dig in. Give it your best shot, bring out the big guns and don't stop firing till it's empty.

I didn't antique the kitchen cabinet, that's an antiquated idea.

Now, Herr astyle, show me your English language skills and beat me at my own game to become World Champion, or just find one spelling error in my Alliteration;
Alliteration Aggrandizement

Because to raise the bar you have to beat me. I raised the bar in every forum in the World with a running game google could show me. To raise the bar you have to beat me. I am the Bar.

Schoolma'am schoolmaster's schoolmarm schoolmate.

That's four Word Alliteration. Highest number of same starting letters in each word wins. The old record was four letters and I beat that before I knew how to play the game. I hit 5, 6, skipped 7 and went straight to 8 letters.

But I take the fun out of it for everybody, so I quit the game after becoming The Bar. To continue like beating them with one.
And right after that everybody at able2know.org stopped playing for a year. That made me feel really bad because they were my only competition.

So thanks for the spellcheck, but you've got a way to subdue a syllable-slinging Sorcerer and phrase phenom like pox


Proton1234, I have special words for you since you cussed me in PM then ended the conversation and ran off before I could respond.

No matter the name you use, no matter how far you run. A curse on you, your son and the son of your son.
 
I went for Special Edition Using TCP/IP by John Ray, Hacking Exposed First Edition, The XML Bible Second Edition by Rusty Harold, and stole Steal This Computer Book by Wallace Wang.

Steal this is an into into how to get in trouble online and has a section on phone phreaking. Between teaching myself to use a computer in 93 and buying one in 98 that was my passion. (My previous experience with the AppleII was of no help whatsoever with Windows.)

I had a thin green book on phreaking and a bank of 5 scanners, shortwave radio, inline scrambler/descrambler and more antenna on the roof than drhowarddfine has hairs on his head.The Sheriff Dept used a scrambler. Sometime they would just ask what dispatch wanted for lunch from Hardees.

Then one day someone said they had forgotten his password to log onto the Missouri Uniform Law Enforcement website. (MULE) It was a traffic code I was very familiar with, easy to remember and not a very good password. It was 6 characters long 5 letters 1 number and I remember exactly what it is. I never was stupid and have never logged on the site to look at it, much less log in.

I lived a block from the NE MO Drug Task Force Office and every time they set somebody up with a wire and switched it on one of my scanners would stop and I would start the tape. Then take it to a friend of mine and let her listen to it.

Cellphones being blocked in the 800MHz Range? Simple. Intermediate frequency times two on a dual conversion scanner and you hear an image of the call outside the blocked range in the clear. Cops used to use that when they knew you were "equiped" with a scanner so you wouldn't hear them. Might have stopped you, didn't stop me.

Cordless phones, on a rainy day I could hear then blocks away. I told my ex-female friend about the call she made to the Dr's office to get narcotics, and the call she made right afterward to sell them. And she lived next door to the Police Station. She was mad at first but got over it.

Now I'm made at her and will never get over it. I remember her current gmail email box password, have wifi hot spots all around me and know how to spoof my MAC and user-agent. If I can wardrive her and log her out of Facebook I'll have it, too. If I ever get bored.

I look like a burned out hippie who hasn't cut his hair in years or changed the way I dress since the 80's. And that's how people treat me, but a person with good intent will treat me fairly. A person of questionable character will see me as stupid and to be taken advantage of, and that is the beginning of the end for them.

Because if offended, I will begin a lesson plan that could only be seen in example of how I dealt with Stevie and his World Chap bot Mitsuku. I am a Behaviorist and trained observer par excellence and underestimating me is the biggest mistake you could ever make, and I'm not done with them yet.

I just wanted Demonica to get the recognition she deserves, and now he is an open book to me and nothing he does will change the outcome because I will turn it on him like I did with my marketing strategy. Cross over to the Dark Side.

His script change to stop right click copy and paste doesn't stop me from pasting text in a terminal any more than it will Demonica's chat box. He lost because he wasn't online long enough, but it's because he took her offline of what he sees as a minor competition rather than give me the chance to loop her again.

Round three is in September and there is another Personality Forge bot entered now. I hope they win, I already have accomplished what I set out to do and not done yet.

SirDice knows what I look like, so does drhowarrddfine, because I trust them. And you wouldn't pick me out of a crowd of two people to have written this. I am as devious and manipulative as they come. I wouldn't be any good as a Programmer if I wasn't, so I'm good with that.

And I'm not done with HUD. They are a formidable but worthy adversary and I'm not the least bit intimidated, I called the HUD DC Field Office up when I was full of the Devil and threatened them with public disclosure and legal actions. Didn't do a bit of good. But I haven't done enough yet

Why did I tell you all of that? For your own good, and we are of the same Daemon clan. This is a thread about security and there are people out there who aren't as honest as me you need to be aware of. So you won't find out the hard way that raggedy-man look is cammo for an Apex Predator with a moral compass spinning like a quasar and are on their naughty list.

By doing something like stealing their material or not knowing your position in the food chain is far below where you thought and you have a lesson coming. Where the end justifies the means. And that's serious.
 
Ok I managed to get in. So C->B and C->A are both ok.
Both A and B are using different ports for ssh. I had to explicitly allow both ports in the pf ruleset:
"pass in on ... from .. to ... port { pA pB} "

I still have a problem though. B cannot access internet when host A's firewall is on.
However, A can can access the internet just fine.
I have tried various things:
like set skip on vm0 etc, where vm0 is the bridge interface for B.
Nothing seems to work.

Does anyone have suggestion on how to setup pf so the bhyve m/c, i.e B can run normally.
Finally, I was able to fix this issue. After going through and cleaning up the PF ruleset one by one.. The device(s) configuration were alright for most part-
 
Avoiding american army activity accepted among algerian accounting Asus addicts and at austrian adventure advocates, adding armenian automobile association.
 
When we can see the ruleset it's easier to help you by seeing the syntax than by a guessing game from bits and pieces of what you think won't compromise your security. If you would have posted it first thing it wouldn't have taken this long to figure out or this many wandering posts in between start and finish.

Are you sure it's working? How about a peek at # pfctl -s all. We love that geeky stuff. it's the only interest I have in your server. I've shown my ruleset and readout numerous times so everybody has seen it...

Works.

If you're that worried about it you probably shouldn't be posting in a forum and phoning Putie personally.


Actually atrocious acquisitions attempted actuating accelerant additions and abetting alcohol at Australian actuary abodes.

Pretty good and you're getting better. Now take your time and do a 50-60 word sentence and tell a story without using the same word twice, post it there and take my title as The Bar in a wacky war whizzing wicked words with infuriating insults inserted inbetween.

The people at able2know were my only competition and good sports. The rest were amateurs and sore losers and needed to be provoked, so insults became a common theme. I took the fun out of it for everybody. It's no fun for them to write a 10 word sentence and me write Crackhead Charles so I just stopped playing. I'm a Monarch, not a tyrant.

The people at bleepingcomputer.com may know computers but a 10 word sentence was the best they could do. They hate me and I couldn't care less.

I didn't post one because I had to insult a woman who thought she was a lot better then she was to get her to fight, then laid Omnipotent Odin on them for the decisive win. It was at grandsnet.com, old people from the UK. I 'll post it at able2know now. They hate me anyway.

Fifteen minutes later I walked downstairs, started talking to 3 girls and forgot what I was talking about mid-sentence. ust like that. I just wrote a complex 60 word sentence and they're standing there staring at me while I'm struggling to think of what I was talking about.
 

I was thinking of starting a separate thread just for the pf problem. Thing is the pf problem came about as I was trying to fix something else, and def not part of this thread- which has taken a life of its own.
Anyway, just to summarize I have elaborated the problem which a few others have also faced trying to get bhvye guest to work properly, and they seemed to have fixed in their own ways. Ultimately, "set skip .. " is your friend .
And everything else can be simplified.
 
Last edited by a moderator:
You can somewhat limit the extend of those attacks using blacklistd(8), security/sshguard or security/py-fail2ban. All these tools will automatically block IP addresses after a certain number of failed login attempts within a specified timeframe. That often helps a lot.
SirDice-- I have been experimenting with blacklistd.. Have been running this for few days now, and I dont see a single entry in the blacklistctl dump. Am using the default conf settings as mentioned in the docs:
Are there specific commands that we can try to check that it is at least working and has been configured correctly. I tried ssh'ing into the machine - from a non-whitelisted machine. The ssh failed, but it didn't show up in the blacklist.
Code:
>blacklistctl dump 
address/ma:port    id    nfail    remaining time

# Blacklist rule
# adr/mask:port type    proto   owner           name    nfail   disable
[local]
ssh             stream  *       *               *       3       24h 
ftp             stream  *       *               *       3       24h 
smtp            stream  *       *               *       3       24h 
submission      stream  *       *               *       3       24h
 
Back
Top