Peter N. M. Hansteen is a user on mastodon.social. You can follow them or interact with them if you have an account anywhere in the fediverse. If you don't, you can sign up here.

Peter N. M. Hansteen @pitrh@mastodon.social

The slides from the just completed BSDCan "PF and networking" tutorial are up at home.nuug.no/~peter/pftutorial - a slight refresh from previous versions. Enjoy!

With only minutes to go before starting the and with tutorial, I finally remembered the username convention for the labs.

I would walk 500 miles
And I would walk 500 more
But we use the metric system here
So in kilometers that's 804

An interesting question turns up via email, but my answer bounces in the exact way described in this article: bsdly.blogspot.com/2017/08/twe - it appears that snakeoil is still considered a vitally important ingredient in Rube Goldberg 'antispam' contraptions.

New to @bsdcan?

Newcomers session, 6 PM, Thursday 7 June, DMS 1140. Come get the road map! Learn about bikesheds, important events, and what's with the goat?

Old to BSDCan? Show up to help orient newcomers.

"Absolute #FreeBSD 3rd ed" is now in early access. Buy now, get early version of the PDF now, then final print & ebook when done. nostarch.com/absfreebsd3 - code ILUVMICHAEL gets you 30% off and me a couple extra bucks. #af3e

Just registered for @BSDCan 2018. See you all (or quite a few of you?) in Ottawa in June!

If you haven't done so already, go to bsdcan.org/2018/schedule/ and check the program, then register while the online option is still open.

It appears that my spamtraps have entered a canon of sorts. On our freshly configured imapd, this bsdly.net/~peter/20180509_imap happened. Login attemps to spamtrap IDs, earning of course only a place in the permanent blocks (as described in bsdly.blogspot.no/2017/04/forc)

So happy to hear that somebody appreciates root@$mymailserver's writing - home.nuug.no/~peter/20180508_w but I would prefer they go read what bsdly.blogspot.com is actually about.

p2k18 Hackathon report: Marc Espie (espie@) on pkg_* and packages progress
undeadly.org/cgi?action=articl

p2k18 Hackathon report: Solene Rapenne (solene@) on joining the project, packages progress undeadly.org/cgi?action=articl

This somehow made it to my inbox - spam of course but with some real translation gems - as text with headers here, home.nuug.no/~peter/spam-and-s graphic preserved at home.nuug.no/~peter/spam-and-s

I take log entries like

Apr 23 12:27:16 skapet sshd[55094]: Failed password for invalid user admin@bsdly.net from 74.208.218.114 port 38760 ssh2

as evidence that the "salting the mine, poisoning the well" (as outlined in bsdly.net/~peter/traplist_ethi) project is succeeding.

I suppose it takes a special kind of weird to be truly happy to see pop3 gropers auto-LART themselves by trying to read noreply's mail. This bsdly.blogspot.co.uk/2017/04/f from last year explains it all, and it's still happening. Nothing to add, I'm just happy to see the setup works.

Don't worry, that was not a creative explosion happening over at bsdly.blogspot.com.

Only me making bad formatting of old posts slightly less awful. But do come read anyway :)

While looking for something else in my webserver logs I notice that there are several hosts that try to fetch the hourly traplist dumps bsdly.net/~peter/bsdly.net.tra but via http and ignoring the redirect to https. Both sites (bsdly and nuug) now force https, update your setups!

Looking at the SSH bruteforcers (password guesssing) by country data so far this month it looks like RU has overtaken CN for the first time in a while. Is this a trend? Anybody else looking at this angle, I would like to hear from you!