A new Hacking for the Holidays @Humble bundle from @nostarch is on now https://www.humblebundle.com/books/hacking-for-the-holidays-books get your #hacking reading dirt cheap *and* help fund the @eff!
After all those years, in between lots of (virtual) hot air #DMARC reports I get an #SPF-induced bounce for a message with an existing (though not heavily used) $firstname.lastname@example.org alias as fake from address.
The whois for the real sender has this gem: "Registrar Abuse Contact: Service not supported currently"
In this #blooper_reel entry, they think that alias is Swedish. TXT https://www.bsdly.net/~peter/20181210_cecil_bsdly_victim.txt PNG https://www.bsdly.net/~peter/20181210_cecil_bsdly_victim.png - still those physical limitations, y'know
oh, more for the #blooper_reel: mail aliases still have the same physical limitations with respect to masturbation. PNG https://www.bsdly.net/~peter/20181210_aldo_bsdly_victim.png TXT https://www.bsdly.net/~peter/20181210_aldo_bsdly_victim.txt
The main effect here is an uptick in number of bruteforcers trapped and more new spamtraps than usual at https://www.bsdly.net/~peter/traplist.shtml (also see the log at https://www.bsdly.net/~peter/spamtraps-dateadded.txt (plus of course https://bsdly.blogspot.com/2018/08/badness-enumerated-by-robots.html and refs there).
Another round of "Hail Mary Cloud" pattern (see https://bsdly.blogspot.com/2013/10/the-hail-mary-cloud-and-lessons-learned.html) ssh login attempts with lots of new unknown user names seems to be in progress. Do check your auth logs - do you see a spike over the last few days (starting Dec 7 19.30ish CET here)?
No end of #blooper_reel material (again that poor alias is physically unable to to these things, and still the country is somewhat off) PNG https://www.bsdly.net/~peter/20181207_brinda190_bsdly_victim.png TXT https://www.bsdly.net/~peter/20181207_brinda190_bsdly_victim.txt
Yet another one for the #blooper_reel (email aliases don't wank, interesting choice of country) PNG https://www.bsdly.net/~peter/20181207_hisako151_bsdly_victim.png TXT https://www.bsdly.net/~peter/20181207_hisako151_bsdly_victim.txt
One more for the #blooper_reel (email aliases don't wank, interesting choice of country) PNG https://www.bsdly.net/~peter/20181207_christine314_bsdly_victim.png txt https://www.bsdly.net/~peter/20181207_christine314_bsdly_victim.txt
DNSSEC enabled in default unbound(8) configuration https://undeadly.org/cgi?action=article;sid=20181207141635
OpenSMTPD proc filters & fc-rDNS https://undeadly.org/cgi?action=article;sid=20181207122515
Somebody bought themselves a seriously shitty spamto: list #spam #blooper_reel PNG: https://home.nuug.no/~peter/20181205_lexie_jones_for_mailer-daemon.png TXT: https://home.nuug.no/~peter/20181205_lexie_jones_for_mailer-daemon.txt
Otto Moerbeek on the Virtues of OpenBSD malloc(3) https://undeadly.org/cgi?action=article;sid=20181130162257
A proposal for a new RPKI validator: OpenBSD rpki-client(1) https://undeadly.org/cgi?action=article;sid=20181130162059
OpenBGPD - Adding Diversity to the Route Server Landscape https://undeadly.org/cgi?action=article;sid=20181128191120
OpenBSD Community reaches Iridium in 2018! https://undeadly.org/cgi?action=article;sid=20181119193902
One more for the blooper reel - Phishing for root@ may be a slightly sub-optimal stragegy. png: https://home.nuug.no/~peter/20181117_root_password_set_to_expire.png text https://home.nuug.no/~peter/20181117_root_password_set_to_expire.txt
Microsoft goes Gold for 2018! https://undeadly.org/cgi?action=article;sid=20181115073118
People are still reading The Book of PF https://nostarch.com/pf3 it seems, and a kind reader alerted me to a wrong URL therein. New erratum (#3) for the book is up at https://www.bsdly.net/~peter/bookofpf/errata-03-wrong_url.txt
It's Monday night in CET and you probably haven't read this one yet: Goodness, Enumerated by Robots. Or, Handling Those Who Do Not Play Well With Greylisting https://bsdly.blogspot.com/2018/11/goodness-enumerated-by-robots-or.html - another 'improving your quality of life with #OpenBSD base system tools' piece.
Occasional rants about IT with an OpenBSD slant at http://bsdly.blogspot.com
Follow friends and discover new ones. Publish anything you want: links, pictures, text, video. This server is run by the main developers of the Mastodon project. Everyone is welcome as long as you follow our code of conduct!