IRC log for #wowace on 20180310

00:03.56*** join/#wowace SunTsu (miyamoto@bnc.suntsu.org)
00:03.56*** join/#wowace SunTsu (miyamoto@unaffiliated/suntsu)
00:27.46*** join/#wowace SunTsu (~miyamoto@bnc.suntsu.org)
00:28.05*** join/#wowace SunTsu (~miyamoto@unaffiliated/suntsu)
01:19.35*** join/#wowace purl (ibot@rikers.org)
01:19.35*** topic/#wowace is https://wowace.com/ | 7.3.x ToC: 70300 | https://wowace.com/paste/ | http://lua.org | This channel is logged, via purl | Vote on Twitch 2FA options: https://goo.gl/CWiHFi https://goo.gl/snFnWY https://goo.gl/SXoS7s https://goo.gl/StjdMd
01:30.36*** join/#wowace SunTsu (miyamoto@bnc.suntsu.org)
01:31.01*** join/#wowace SunTsu (miyamoto@unaffiliated/suntsu)
02:07.53*** join/#wowace SunTsu (~miyamoto@bnc.suntsu.org)
02:08.11*** join/#wowace SunTsu (~miyamoto@unaffiliated/suntsu)
02:43.08*** join/#wowace SunTsu (miyamoto@unaffiliated/suntsu)
03:43.55*** join/#wowace Seerah (~umsin@2601:3c2:80:1380:3d2c:a1de:4e08:3142)
04:29.02*** part/#wowace Seerah (~umsin@2601:3c2:80:1380:3d2c:a1de:4e08:3142)
05:57.53*** join/#wowace ShadniX (dagger@p4FF9F6CB.dip0.t-ipconnect.de)
06:40.55quiescensmoo
07:17.20*** join/#wowace harl (harl@unaffiliated/harl)
07:39.03*** join/#wowace tunekey (~tunekey@unaffiliated/tunekey)
07:46.14*** join/#wowace tunekey (~tunekey@unaffiliated/tunekey)
07:57.29*** join/#wowace tunekey (~tunekey@unaffiliated/tunekey)
08:17.45Gnarfozznf: https://www.supermicro.com/newsroom/pressreleases/2017/press171128_Intel_Ruler_NVMe.cfm
08:17.52GnarfozCan has?
08:18.26FiskerI rather want the nvidia ruler
08:18.56GnarfozNvidia already rules
08:19.28Gnarfozznf: Monokai should be available as long as it's available as an iTerm color file
08:20.46Gnarfozznf: I use PM2 for that as well, don't know about alternatives. PM2 can be a bit annoying when combined with nvm, since its config will be stored in the version-dependent path
08:21.16GnarfozProbably best to get used to using the ecosystem.json thing right away
08:23.21Gnarfozznf: I've never really used cipherli.st, their recommendations were the typical "oh, you have actual users? Well, tough luck if they can't connect anymore" variety. I built my list from Ivan Ristic's blog posts (engineer at Qualys SSL labs)
08:45.08*** join/#wowace Megalon (~wig0r@193-81-177-88.adsl.highway.telekom.at)
11:58.26Gnarfozznf: https://photos.app.goo.gl/7qbcncqqNb4fl3Bw1
12:14.58quiescenso.O
12:35.15*** join/#wowace ls- (~ls@223.204.247.52)
12:42.44ls-Torhal: I have few requests/suggestions regarding curseforge >_> deleting phrases one by one is a PITA, esp if there's hundreds of strings, can something be done about it? and it'd be nice if you used block comments for multiline strings when exporting stuff >_>
12:43.18Megalondrop * from strings
12:44.24ls-eh? o_O
12:50.41nevcairieljust use the import function, you can tell it to drop all phrases not in the current import
12:50.49nevcairielso export english,d elete phreases,  import again, done
12:51.37ls-nah, that's not the problem I have :D
12:52.07ls-as for import trick, ty
12:56.21ls-I usually keep untranslated stuff as commented out English strings, but because curse exporter always uses -- for comments, I have to fix stuff manually later >_>
13:07.32Megalonhttps://www.amazon.de/dp/B01E18RLPI for the man who has everything
13:13.16ls-there's a guy in our office that uses them, they're quite handy o_O
13:14.21ls-although have no idea why he's wearing fancy stuff, the rest of programmers wears shorts and tees >_>
14:03.08znfGnarfoz: no. Cipher also had "still have XP users?" section
14:04.20*** join/#wowace wink_ (fhtagn@porkchop.art-core.org)
14:15.29Gnarfozznf: yeah even those were bad :>
14:15.55Gnarfozi.e. a manual choice gave a better result for me :-)
14:16.35znfNever had a user complain
14:16.42znfI just tell XP users to gtfo
14:23.40*** join/#wowace wink (fhtagn@unaffiliated/winkiller)
15:01.00GnarfozMegalon: totally not machine translated
15:03.36Gnarfozls-: your suggestions are probably better off here https://invite.twitch.tv/C1ya
16:12.37nevcairielGnarfoz: znf: mozilla also maintains a list of cyphers for various compatibility levels (https://wiki.mozilla.org/Security/Server_Side_TLS and config generator https://mozilla.github.io/server-side-tls/ssl-config-generator/)
16:12.44znfI know
16:12.48znfI used that
16:13.00znfbecause the cipher list repo points to it as an alternative
16:15.17Funkeh`fuck XP users
16:16.12znfpretty much
16:16.19znfsoon fuck Windows 7 users, too!
16:16.23znfwhen's EOL? 2 years? 2020?
16:16.33Funkeh`just under 2 years
16:16.45nevcairielnone of those profiles even fuck windows 7 users
16:16.52nevcairielie11 on 7 supports all relevant things
16:17.14Funkeh`force tls 1.3 only
16:17.28nevcairielnothing supports that anywhere
16:17.29nevcairiel:p
16:17.56Funkeh`chrome does
16:19.26Gnarfozit's not "XP users" btw, shows how much attention you paid :P
16:19.45nevcairiel1.3 is even still a working draft only
16:20.28Funkeh`i believe so, it's the draft that is supported
16:21.08Gnarfozhow well supporting drafts instead of finalized versions works can be seen in wifi land
16:21.09Gnarfoz:D
16:21.11znfGnarfoz, it's the same tier :P
16:21.13nevcairielits apparently available in a few browsers but not the default choice if the server gives you a choice
16:21.17znfXP users, no SNI, shit algos
16:21.26nevcairielbecause it still breaks all over
16:21.36Gnarfozznf: and yet, Chrome and Firefox work fine there
16:21.59znfI don't know man, I don't care that much. I copy paste shit to get A on ssl labs
16:22.07znfunless client has users from the stoneage
16:22.18nevcairielgetting A is even possible with XP support
16:22.22Gnarfoz^
16:22.30GnarfozI don't get to just exclude people because "fuck them"
16:22.38znfTLS config is just voodoo to me
16:22.46Gnarfozthey're customers, terrible customers, but customers nonetheless
16:23.02nevcairielwe just canned XP support in our latest software release, but thats a different thing then some server tls config
16:23.14Gnarfoz(don't get me wrong, we don't support IE6/XP :P it's just the mentality that annoys me)
16:23.48Funkeh`what? lol, it's not because "fuck them". Every single shit cypher you enable increases your attack surface for all your other users, in the form of widening the effectiveness of a potential downgrade attack
16:23.48GnarfozI wonder if nmap has managed to get a new cert, yet
16:24.09GnarfozFunkeh`: <Funkeh`> fuck XP users <znf> I just tell XP users to gtfo
16:24.19znfThere is a certain point when you should really tell them to fuck off. Stop enabling them.
16:24.19Funkeh`that was just in general
16:24.24Funkeh`fuck em all
16:24.34Gnarfozznf: sure, that point is when we don't want their money anymore :D
16:24.48znfIf they haven't upgraded in 2 decades, do they even have money to spend? :D
16:24.55Gnarfozit's b2b, you'd be surprised how much shit you deal with
16:25.12Megaloncompiles fortran
16:25.32nevcairielthere is a lot of money to be made if you're crazy enough to still know fortran
16:25.36GnarfozI'm not sure we have fortran programs, but quite a lot of RPG
16:25.44znfI remember some "developer" said that he keeps a machine with Windows 2000 to check if his program works on it
16:25.48znfthat was somewhat recent
16:25.51Megalonrecodes *foz in ALGOL
16:25.52znfI'm like... for real?
16:26.17nevcairielsome years ago i tried to install fresh XP in a VM, that was basically impossible because MS shut down all sorts of web services that XP uses
16:26.19znfStop enabling those fucks. Let shit die already, stop pumping IV fluids
16:26.23nevcairielcouldnt update it anymore, or whatever
16:26.27*** join/#wowace Telshin (sid114244@gateway/web/irccloud.com/x-xwervoewtdabubbs)
16:26.48znfI think I have an XP VM on my laptop
16:26.52znfbut I barely use it
16:27.07znfdidn't even add networking to it
16:27.22nevcairielall software i work on stopped supporting XP since then, so shrug
16:27.25znfthat thing would probably blow up from everything
16:28.11Gnarfoznope. nmap.org still inaccessible to me :D (Chrome 66 dev/beta already block Symantec-rooted certs)
16:28.29znfyeah, I noticed that too 2 days ago
16:28.38Gnarfozyou'd think people like that would be more aware
16:28.39znfI haven't upgraded my cert either
16:28.46znfI have a few clients with those old certs
16:28.53Gnarfozwell, you have like... a couple of days left
16:28.55znfproblem is - I keep asking for the renewal, but no confirmation email
16:29.05Gnarfozor, they do, as it were
16:29.28znfoh, wtf
16:29.35znfconnection refused on the clients webmail
16:29.38znfthe fuck is wrong now
16:29.48nevcairielwe use a symantec code signing cert, i wonder if those will go invalid as well
16:29.58Gnarfozdon't think so
16:30.25Gnarfozit's a CA/B forum thing, isn't it
16:30.34znfuhm
16:30.39znfthis is weird
16:31.02znfthe fuck did these guys do https://i.imgur.com/s37IbuJ.png
16:31.22Gnarfozreboot, as it appears
16:31.28znfquestion is... WHY
16:31.57znfyou know what the biggest issue with this stupid cert shit?
16:32.11znfchrome won't auto-complete usernames/passwords if you bypass the security warning
16:32.26Gnarfozgood
16:32.27Gnarfoz:D
16:32.38znfnot good
16:32.53znfI don't know the clients system logins by heart :(
16:33.28nevcairielif you solely rely on chrome remembering the shit, you are screwed anyway
16:34.08znfAUTHENTICATE PLAIN: Authentication failed.
16:34.10znfBAAAAAAAAAAAAAAAH
16:36.21znfand before you say anything - the imap server allows PLAIN login only from 127.0.0.1
16:36.33Gnarfozmine only supports plain, as well
16:36.51Gnarfozonly after you say the magic word, though
16:36.58GnarfozSTARTTLS
16:37.11Gnarfozwithout that, it supports not authentication mechanisms at all :p
16:37.24Gnarfoz-t
16:37.36Megalonoh i thought the magic word is FORFUCKSSAKEYOUSTUPIDPIECEOFSHITSTARTWORKINGORIWILLANNIHILATEYOU
16:37.44znfI think I had some issue with the CA not validating for localhosts
16:37.53znfand I run out of patience and I just allowed plain for 127.0.0.1
16:38.02znfsomething about php not liking the CA
16:39.46znfGnarfoz, you know what else is stupid?
16:39.47znfhttps://i.imgur.com/8YNr6q9.png
16:39.55znfI have to log on the certificate website to reissue
16:40.02znf...but they haven't reissued their cert
16:40.32Gnarfozgood job
16:41.17znflol, I can't reissue the cert for this client
16:41.19znfit's not in the list anymore
16:41.41Gnarfozdoes that even fall under "reissue"
16:41.53Gnarfozdepends on the vendor how they call that
16:41.58znfYes: https://i.imgur.com/md2AJjt.png
16:42.13Gnarfozrofl what
16:42.16Gnarfoz"do needful"
16:42.26Gnarfozare they /r/sysadmin idiots
16:43.02Gnarfozno, they're just bad in general, it seems. :D
16:43.39znfthis fucking sucks dick
16:43.42znfFUCK IT
16:43.44znfCertbot.
16:43.47Gnarfozhttps://dev.ssllabs.com/ssltest/analyze.html?d=my.clickssl.com noice
16:44.50znfyeah, I hit the "reissue certificate" button a few days for this domain
16:44.55znffew days ago*
16:45.04znfI never got the verification email to admin@domain
16:45.46znfI wanted to do it again now
16:45.50znfthe domain is not in the list anymore
16:46.07GnarfozI'm more annoyed that I'll either have to build a custom openssl or replace our load balancers entirely (which I maybe should anyway, considering how old the hardware is and that one of them recently failed), to get http/2 working again
16:47.40znfhttp2 is life
16:47.50znfthat reminds me, I wonder how do I get http2 working on Ubuntu 14.04 with Apache
16:47.55Gnarfozit might be, but even Firefox dropped NPN support now
16:48.12Gnarfozprobably the same way I just described :P
16:48.26znfthere should be a PPA for it!
16:48.37Gnarfozhere, have mine
16:48.44Gnarfozit certainly won't mine bitcoins while you're not looking
16:49.00znf*suspicious*
16:49.12znfremoved ‘jdk-8u151-linux-x64.tar.gz’
16:49.12znfremoved ‘jdk-8u144-linux-x64.tar.gz’
16:49.12znfOracle JDK 8 installed
16:49.14znfNot even on Linux.
16:49.19znfThis is like plague.
16:49.27Gnarfoz???
16:49.31znfjava updates!
16:49.32Gnarfozwhat are you saying :p
16:49.39Gnarfozwhy do you have the jdk
16:49.44Gnarfozdon't you just want the jre :P
16:49.52Gnarfozand what's bad about having the latest version? :D
16:49.59znfdidn't work properly with Solr for some reasons
16:50.11Gnarfozthe same reason "php didn't like the CA"?
16:50.12znfor was it with Tika?
16:50.25znfI think it was Tika being all bitchy
16:50.45znfProbably.
16:50.53Gnarfozhmm sneaky pete s2
16:51.01Gnarfozthanks prime video app
16:51.17Gnarfozeven though I'm not sure I ever told you to annoy me with stuff like this :D
16:51.17znfclient asked me if they should buy a new server
16:51.25znfIntel(R) Xeon(R) CPU           E5506  @ 2.13GHz
16:51.29Gnarfozfucking opt-out notifications
16:51.50Gnarfozwell, there's spectre microcode updates even for those ones now, so, tell him he can keep using it :D
16:52.01znfit's got 4GB ram :(
16:52.14znfimagine how fun is that with Solr + Tika
16:52.26Gnarfozsuper fun
16:52.30Gnarfozas long as the dataset is small.
16:52.32Gnarfoz:D
16:52.45znf450GB of emails
16:52.45Catal1naIt is full of stuff like this anyway
16:52.48znfwhat do you think?
16:52.55znf*looks at the bot*
16:53.03znfdidn't I tell this thing to shut the fuck up here
16:53.07Gnarfozyou did
16:53.19znf>search cobe
16:53.21Catal1nasupybot.plugins.Cobe, supybot.plugins.Cobe.ignoreRegex, supybot.plugins.Cobe.ignoreWaitTimeIfAddressed, supybot.plugins.Cobe.probability, supybot.plugins.Cobe.probabilityWhenAddressed, supybot.plugins.Cobe.public, supybot.plugins.Cobe.responseDelay, supybot.plugins.Cobe.stripNicks, supybot.plugins.Cobe.stripUrls, and supybot.plugins.Cobe.waitTimeBetweenSpeaking
16:53.38Gnarfozalso who has 450 GB of emails, are they running a public webmail service
16:54.00znf>config --channel supybot.plugins.Cobe.probability 0
16:54.00Catal1naWorked, bitch.
16:54.06znfGnarfoz, KissFM
16:54.10znfradio station
16:54.48Gnarfozwe have one of those https://en.wikipedia.org/wiki/98.8_KISS_FM_Berlin
16:55.51znfone of the biggest radio stations around, so yeah
16:56.32GnarfozI'm not motivated to finish my phpbb upgrade
16:56.47Gnarfoz(well the upgrade is done, I guess, but needs theme + extensions etc)
16:57.29*** join/#wowace stolenlegacy (~stolenleg@unaffiliated/stolenlegacy)
17:00.37znfGnarfoz, is there a ssl checker that supports pop3/imaps?
17:01.26znfcan't tell if the chain is deployed properly
17:06.03znfseems to be working *shrug*
17:11.34Gnarfozopenssl s_client -connect mail.example.com:25 -starttls smtp
17:11.47Gnarfoz(well + -CApath maybe)
17:12.20Gnarfozthere's also https://www.checktls.com/ https://ssl-tools.net/mailservers etc
17:16.43Gnarfozand of course: https://testssl.sh/
17:16.52Gnarfozwhich you can run yourself
17:30.21Gnarfozalthough... checktls somehow managed to think my server still uses a startssl certificate
17:30.50Gnarfozerr, no, the other one, ssl-tools.net
17:31.39GnarfozReport created Sun, 04 Oct 2015 15:00:32 +0000
17:32.12Gnarfozhow about you shitters invalidate reports older than... well, certainly over 2 years is too much :P
17:46.12znfhttps://ssl-tools.net/mailservers/mail.kissfm.ro
17:46.13znf>_<
17:46.25znfchecked in 2016 lol
17:46.26znfjesus man
17:46.37znfah, there's a refresh button
17:51.38znfI'm still wondering why that guy killed cipherli.st :-/
17:53.42znfhttps://github.com/RaymiiOrg/cipherli.st/pull/94#issuecomment-355014823
17:53.42znfmeh
17:54.52*** join/#wowace Seerah (~umsin@2601:3c2:80:1380:3d2c:a1de:4e08:3142)
18:37.49*** join/#wowace Funkeh` (~Funkeh`@WoWUIDev/WoWAce/Ace3/BigWigs/funkeh)
18:37.49*** mode/#wowace [+o Funkeh`] by ChanServ
18:39.57znfAnyone wants a cheap ThinkPad T470s? :D
18:42.00znf20GB, 1080p, 256GB NVMe, I think
19:28.25Gnarfozheh, that raymii comment is exactly what I meant
19:28.49Gnarfozgood that at least they themselves came to that realization
19:29.09nevcairielyeah that page didnt explain shit
19:42.21znfGnarfoz, you know what annoys me?
19:42.30znfThere's no simple way to generate certs for internal hosts :(
19:42.49znfwith LE
19:42.56Gnarfozgenerate them? sure, but that's probably not what you meant
19:43.02znfYou know what I mean.
19:43.02nevcairielwell duh, they cant validate
19:43.18nevcairielwait for wildcard and copy it all over
19:43.26znfthat's also going to be a bitch
19:43.28Gnarfoztwo options: your own CA; or: don't make "internal hosts"
19:44.04znfmostly because some devices don't have a decent way of automating certificate updates
19:44.15znfwonder if I can use some sort of hook
19:44.17znfinto bind
19:44.19znf*ponders*
19:45.12znfI know bind has some way of updating records via ddns or something like that
20:15.19znf...I've been testing for 30 minutes
20:15.40znfonly to realize this doofus made the nameserver inaccesible
20:15.41znf:-|
20:18.47znfjesus christ, he likes pressing buttons like an idiot hoping he can "secure" his network
20:19.01znfgood job, dumb fuck, you crippled your domain by having your 1st nameserver inaccesible
20:50.47quiescensgo to sleep
20:51.55pompy1^
21:38.22quiescensgives pompy1 a cookie
22:39.07*** join/#wowace vince` (~vschiu@50.35.70.27)
22:39.24*** join/#wowace Brybry (~Brybry@unaffiliated/brybry)
22:43.34*** join/#wowace Lejving__ (~Lejving@81-233-148-192-no524.tbcn.telia.com)
23:27.51*** join/#wowace vince` (vschiu@50.35.70.27)
23:37.36*** join/#wowace pompy (~Mike@c-73-194-183-217.hsd1.nj.comcast.net)
23:48.18*** join/#wowace Funkeh` (~Funkeh`@WoWUIDev/WoWAce/Ace3/BigWigs/funkeh)
23:48.18*** mode/#wowace [+o Funkeh`] by ChanServ

Generated by irclog2html.pl Modified by Tim Riker to work with infobot.