Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Brand Logo

agnos.is Forums

  1. Home
  2. Programmer Humor
  3. Peak security

Peak security

Scheduled Pinned Locked Moved Programmer Humor
programmerhumor
93 Posts 57 Posters 3 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • Q [email protected]

    I'd rather plug in a screen with VGA than deal with HPE iLO 4

    N This user is from outside of this forum
    N This user is from outside of this forum
    [email protected]
    wrote on last edited by [email protected]
    #58

    Networking noob here; what, pray tell, is HPE iLO4... or do I want to even know?

    Edit: Never mind. Found it. HP... shudders

    B 1 Reply Last reply
    2
    • U [email protected]

      Rust does not have an ABI. Everything is linked into the executables. I would not call them lightweight.

      Q This user is from outside of this forum
      Q This user is from outside of this forum
      [email protected]
      wrote on last edited by [email protected]
      #59

      A standard Docker container with a NodeJS/PHP/Python app is usually around 200-300 MB (yes really), the OpenJDK JVM is around a hundred MB, but a fully statically compiled rust binary that doesn't even depend on libc is just a couple MB and can be deployed as a tiny distroless Docker container.

      It's a lot heavier than your 8kb C++ executable but it's nothing compared to what is required to deploy anything else.

      1 Reply Last reply
      1
      • Q [email protected]

        I remember there being the option of using HTML or a Java applet, I chose the former

        appoxo@lemmy.dbzer0.comA This user is from outside of this forum
        appoxo@lemmy.dbzer0.comA This user is from outside of this forum
        [email protected]
        wrote on last edited by
        #60

        If you have the HTML5 option you should be on a pretty recent firmware.

        Interesting that you'd prefer going (literally) analog connection rather than over the IPMI.

        Q 1 Reply Last reply
        2
        • P [email protected]

          Before you make a change, do this in a screen-session:

          sleep 300 && iptables-restore old_fw_rules.bak

          eager_eagle@lemmy.worldE This user is from outside of this forum
          eager_eagle@lemmy.worldE This user is from outside of this forum
          [email protected]
          wrote on last edited by
          #61

          permission denied

          fuuuu

          I 1 Reply Last reply
          10
          • Q [email protected]

            ^This^ ^is^ ^a^ ^joke,^ ^I^ ^didn't^ ^really^ ^lock^ ^myself^ ^out^

            V This user is from outside of this forum
            V This user is from outside of this forum
            [email protected]
            wrote on last edited by
            #62

            Rescue mode with networking, mount drive, make changes and reboot.

            1 Reply Last reply
            1
            • M [email protected]

              even worse. I regularly have to get up out of my chair and go down 2 stairs.

              Also this took a while to find, but : https://sourceforge.net/p/shorewall/svn/HEAD/tree/branches/4.2/Samples/one-interface/shorewall.conf

              ADMINISABSENTMINDED=Yes

              Is an actual setting in the config for the (now apparently unmaintained) Shorewall Firewall software/tool for linux.

              If I remember correctly, it always checks on firewall rule changes if there is an active connection on port 22, and adds a special rule at the end to maintain that connection.

              They don't build them like they used to anymore.

              J This user is from outside of this forum
              J This user is from outside of this forum
              [email protected]
              wrote on last edited by
              #63

              They don't build them like they used to anymore.

              Well if we did, the way it works would be by telling a chatbot to enable ssh on port 22 at the end.

              1 Reply Last reply
              5
              • J [email protected]

                Would misusing the dd command be considered a hardware failure?

                S This user is from outside of this forum
                S This user is from outside of this forum
                [email protected]
                wrote on last edited by
                #64

                Yup, that's a bug in the chair-keyboard interface.

                1 Reply Last reply
                1
                • G [email protected]

                  Oh, so it's inconvenient for GPL-circumventers, too? That just sounds better and better.

                  U This user is from outside of this forum
                  U This user is from outside of this forum
                  [email protected]
                  wrote on last edited by
                  #65

                  To me, it is mostly a real blocker for using it in some embedded Linux devices due to size constraints, otherwise I personally would be using it extensively.

                  G 1 Reply Last reply
                  0
                  • dbtng@eviltoast.orgD [email protected]

                    I hate it when my boss says that. Or he will call it "D-RAC". Annoys the hell out of me.
                    It's iDRAC.
                    Yes, there are components that are called RAC, but the Dell out of band management system is called iDRAC.
                    ... but that's not as dumb as when he calls the SuperMicro system "iLO". That's IPMI. We don't even own any HPE. I've no idea why he's stuck on iLO.

                    A This user is from outside of this forum
                    A This user is from outside of this forum
                    [email protected]
                    wrote on last edited by
                    #66

                    It's iDRAC.

                    I'd say that RAC is the overarching term for different Dell Solutions, see Dell Remote Access Configuration Guide

                    DRACT supports the following types of RACs that support RACADM commands:

                    • Integrated Dell Remote Access Controller 8 (iDRAC8)

                    • Integrated Dell Remote Access Controller 7 (iDRAC7)

                    • [...]

                    • Chassis Management Controller (CMC) for Dell PowerEdge M1000e and PowerEdge VRTX

                    • [...]

                    And it's just shorter and easier to say ¯\_(ツ)_/¯

                    but that's not as dumb as when he calls the SuperMicro system "iLO". That's IPMI. We don't even own any HPE. I've no idea why he's stuck on iLO.

                    Perhaps his first encounter with remote management was with iLO and he just thinks that this is how it's called. It's "integrated Lights Out", and "Lights-Out Management" as well as "Remote Access Controller" both are generic terms (and I suspect that this is why Dell adds an “iD” in front of its product names).

                    But we are way to close to the “GNU/Linux Copypasta” than I would like.

                    dbtng@eviltoast.orgD 1 Reply Last reply
                    1
                    • U [email protected]

                      To me, it is mostly a real blocker for using it in some embedded Linux devices due to size constraints, otherwise I personally would be using it extensively.

                      G This user is from outside of this forum
                      G This user is from outside of this forum
                      [email protected]
                      wrote on last edited by [email protected]
                      #67

                      I'm having a hard time imagining this Goldilocks embedded device that is simultaneously big enough to run Linux (so not an actual microcontroller), yet too small for a few megabytes worth of statically-linked libraries. Got an example?

                      1 Reply Last reply
                      1
                      • randint@lemmy.frozeninferno.xyzR [email protected]

                        Almost the same thing happened to me. I accidentally fucked up the internet connection in my home while in Japan, and I had to video call my mom to have her fix it. It was a pain for both of us, but thankfully it went rather smoothly. Thank you mom!

                        B This user is from outside of this forum
                        B This user is from outside of this forum
                        [email protected]
                        wrote on last edited by
                        #68

                        Do you mind explaining the details? I’m trying to learn as much as possible!

                        H randint@lemmy.frozeninferno.xyzR 2 Replies Last reply
                        2
                        • N [email protected]

                          Networking noob here; what, pray tell, is HPE iLO4... or do I want to even know?

                          Edit: Never mind. Found it. HP... shudders

                          B This user is from outside of this forum
                          B This user is from outside of this forum
                          [email protected]
                          wrote on last edited by
                          #69

                          “In December 2021 Iranian researchers at Amnpardaz security firm have discovered rootkits in HPE's iLO (Integrated Lights-Out) management modules.”

                          Because of course lol

                          1 Reply Last reply
                          4
                          • A [email protected]

                            Well, I have my server running in my parents basement, because they have fiber, and I don't.

                            It's not quite a 500km drive, but still a long enough distance for this scenario to be a major inconvenience.

                            But since I have wireguard running on their router though this specific scenario is not something that could happen to me

                            B This user is from outside of this forum
                            B This user is from outside of this forum
                            [email protected]
                            wrote on last edited by
                            #70

                            Wireguard is a VPN protocol, so you are able to tunnel into their router to…do what exactly?

                            A 1 Reply Last reply
                            0
                            • P [email protected]

                              Before you make a change, do this in a screen-session:

                              sleep 300 && iptables-restore old_fw_rules.bak

                              I This user is from outside of this forum
                              I This user is from outside of this forum
                              [email protected]
                              wrote on last edited by
                              #71

                              Yeah except it would be iptables-restore < old_fw_rules.bak

                              P 1 Reply Last reply
                              1
                              • eager_eagle@lemmy.worldE [email protected]

                                permission denied

                                fuuuu

                                I This user is from outside of this forum
                                I This user is from outside of this forum
                                [email protected]
                                wrote on last edited by
                                #72

                                Found the debian user.

                                eager_eagle@lemmy.worldE 1 Reply Last reply
                                1
                                • Q [email protected]

                                  ^This^ ^is^ ^a^ ^joke,^ ^I^ ^didn't^ ^really^ ^lock^ ^myself^ ^out^

                                  T This user is from outside of this forum
                                  T This user is from outside of this forum
                                  [email protected]
                                  wrote on last edited by
                                  #73

                                  Most secure box is the one that does nothing.

                                  1 Reply Last reply
                                  12
                                  • I [email protected]

                                    Found the debian user.

                                    eager_eagle@lemmy.worldE This user is from outside of this forum
                                    eager_eagle@lemmy.worldE This user is from outside of this forum
                                    [email protected]
                                    wrote on last edited by
                                    #74

                                    user permissions is a debian thing now?

                                    I 1 Reply Last reply
                                    3
                                    • I [email protected]

                                      Yeah except it would be iptables-restore < old_fw_rules.bak

                                      P This user is from outside of this forum
                                      P This user is from outside of this forum
                                      [email protected]
                                      wrote on last edited by [email protected]
                                      #75

                                      Fun fact: When you do iptables-save, you have to redirect the output if you want to save it to a file. But when you use iptables-restore, you don't need to pipe it back in, you can just use the filename!

                                      I 1 Reply Last reply
                                      5
                                      • P [email protected]

                                        Fun fact: When you do iptables-save, you have to redirect the output if you want to save it to a file. But when you use iptables-restore, you don't need to pipe it back in, you can just use the filename!

                                        I This user is from outside of this forum
                                        I This user is from outside of this forum
                                        [email protected]
                                        wrote on last edited by
                                        #76

                                        It wasn't always that way. At one time you had to so I still do.

                                        P 1 Reply Last reply
                                        3
                                        • eager_eagle@lemmy.worldE [email protected]

                                          user permissions is a debian thing now?

                                          I This user is from outside of this forum
                                          I This user is from outside of this forum
                                          [email protected]
                                          wrote on last edited by
                                          #77

                                          A long time ago, Debian 8 or so it was a bug with Debian. Something about the command running without root despite the sudo command.

                                          1 Reply Last reply
                                          2
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Login or register to search.
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups