00:36:02etnguyen03 quits [Client Quit]
00:49:37Bleo18260072271962 quits [Quit: Ping timeout (120 seconds)]
00:49:53Bleo18260072271962 joins
01:20:18Froxcey quits [Remote host closed the connection]
01:27:27etnguyen03 (etnguyen03) joins
01:37:43Froxcey (Froxcey) joins
01:42:25Froxcey quits [Ping timeout: 260 seconds]
01:42:49Froxcey (Froxcey) joins
01:49:06simon816 quits [Quit: ZNC 1.9.1 - https://znc.in]
01:50:50simon816 (simon816) joins
02:00:32pixel leaves [Error from remote client]
02:16:10<nulldata>https://x.com/WordPress/status/1852414666238243190
02:16:10<eggdrop>nitter: https://nitter.lucabased.xyz/WordPress/status/1852414666238243190
02:17:44<nicolas17>cringe
02:19:50<@OrIdow6>I forgot about the WP drama after not hearing about it for like 5 days
02:20:14<nicolas17>oh yeah I saw something else
02:20:47<nicolas17>I mentioned a few days ago that Matt will be at the Nerdearla Mexico conference but I later noticed he'll be there *in person*
02:26:49<nulldata>https://trust.okta.com/security-advisories/okta-ad-ldap-delegated-authentication-username/
02:28:08<nicolas17>...
02:28:29<nicolas17>"The input to the bcrypt function is the password string (up to 72 bytes)"
02:28:42<@JAA>Oh yeah, the stupid bcrypt length limit.
02:30:47<hexa->bcrypt in 2024
02:30:54<hexa->at a security focused company
02:34:09<nulldata>I don't think you can really call Okta "security focused"
02:34:20<nicolas17>infosec compliance != security
02:34:56seacow31 quits [Quit: Client closed]
02:36:11seacow joins
02:37:44<@JAA>Did I miss some major developments regarding bcrypt? It has a couple weird quirks like this, and it's not the best mechanism anymore, but it's still solid, isn't it?
02:43:11<hexa->the length limit is a foot gun and scrypt and argon2 exist
02:43:18<hexa->that's all
02:44:48<@JAA>Yeah
02:48:01<Jake>Also, did they go from Bcrypt to PBKDF2??
02:51:30<nicolas17>well it's a cache key
02:51:37<nicolas17>not the authoritative copy of the password database
02:52:03<nicolas17>but still kinda sus
02:55:03<nicolas17>looks like if I ignore discovery of new items, the current queue will be finished in 16 hours
02:55:19<nicolas17>(if I take into account discovery, the queue is growing faster than it shrinks so +infinity)
02:55:45<Jake>ah, I see
02:56:08<nicolas17>wrong channel -_-
03:37:17etnguyen03 quits [Remote host closed the connection]
03:41:15DogsRNice joins
04:49:06<pabs>Common Crawl are hiring: https://news.ycombinator.com/item?id=42018317
05:15:28igloo22225 quits [Quit: Ping timeout (120 seconds)]
05:15:43igloo22225 (igloo22225) joins
05:17:40MetaNova quits [Ping timeout: 260 seconds]
05:18:28f_ quits [Read error: Connection reset by peer]
05:18:52steering quits [Remote host closed the connection]
05:19:04steering (steering) joins
05:19:39MetaNova (MetaNova) joins
05:23:14f_ (funderscore) joins
05:24:40nepeat quits [Ping timeout: 260 seconds]
05:25:45nepeat (nepeat) joins
05:26:06<@JAA>Apparently, Tor nodes are getting abuse-bombed via spoofed TCP packets: https://delroth.net/posts/spoofed-mass-scan-abuse/
05:27:35MetaNova quits [Ping timeout: 260 seconds]
05:29:14Bleo182600722719623 joins
05:29:23Bleo18260072271962 quits [Read error: Connection reset by peer]
05:29:23Bleo182600722719623 is now known as Bleo18260072271962
05:29:29decky_e joins
05:29:37kiska52 quits [Ping timeout: 255 seconds]
05:30:02kiska52 joins
05:30:38decky_e_ quits [Ping timeout: 240 seconds]
05:32:44MetaNova (MetaNova) joins
06:04:45<pabs>steering: eggdrop's nitter instance just gives me "Enable JavaScript and cookies to continue", I'd suggest the twiiit.com redirector instead
07:03:11DogsRNice quits [Read error: Connection reset by peer]
08:13:23dimkauzh (dimkauzh) joins
08:13:31dimkauzh quits [Remote host closed the connection]
08:14:20<qwertyasdfuiopghjkl>Looks like twiiit.com currently only redirects to nitter.privacydev.net, which has a really strict ratelimit (but I guess the other ones probably won't work without JS at all...)
08:49:39<thuban>for my personal twitter announcer i switched to https://publish.twitter.com/oembed?url=<tweet> some time ago
08:50:33<thuban>inferior to a working nitter in some ways, but if you don't have a working nitter...
09:13:08dimkauzh (dimkauzh) joins
09:15:27pixel (pixel) joins
09:16:23pixel leaves
09:17:38dimkauzh quits [Ping timeout: 240 seconds]
09:17:56<magmaus3>https://social.besties.house/@h/113411538282750839
09:18:54<magmaus3>someone is archiving loops
09:19:58<magmaus3>(if you're out of the loop, loops.video is a tiktok-like service for the fediverse, made by pixelfed and currently in beta)
10:06:14dimkauzh (dimkauzh) joins
10:06:22dimkauzh quits [Remote host closed the connection]
10:12:20SootBector quits [Remote host closed the connection]
10:12:49SootBector (SootBector) joins
10:26:15sralracer joins
10:27:45<Barto>JAA: i had to stop running my relay a couple of months ago due to the abuse letters, that would lock-up internet 2 times a week
10:35:09BornOn420 quits [Ping timeout: 240 seconds]
11:00:04Bleo18260072271962 quits [Quit: The Lounge - https://thelounge.chat]
11:02:49Bleo182600722719623 joins
11:05:32<that_lurker>-feed- RCE Vulnerability in QBittorrent https://sharpsec.run/rce-vulnerability-in-qbittorrent/ https://news.ycombinator.com/item?id=42004219
11:17:23dimkauzh (dimkauzh) joins
11:21:24<alexlehm>magmaus3: the site is pretty new and is not yet showing public feeds unless you are a logged in user, i don't think there is anything you can archive yet
11:21:37<alexlehm>i got an account but cannot do anything yet
11:26:05MrMcNuggets (MrMcNuggets) joins
11:26:10dimkauzh quits [Remote host closed the connection]
11:37:24BornOn420 (BornOn420) joins
11:38:10Froxcey quits [Remote host closed the connection]
11:50:56Froxcey (Froxcey) joins
11:55:22dimkauzh (dimkauzh) joins
11:55:30Froxcey quits [Ping timeout: 260 seconds]
11:55:32dimkauzh quits [Remote host closed the connection]
12:06:01<magmaus3>alexlehm: yeah, but it's still cool that someone is doing that
12:13:03<alexlehm>i assume the regular archive.org crawler will catch that when video posts are linked from other social media, up to now the only videos I have seen were from the developer who demoed his site that came from the mastodon profile of pixelfed
12:13:24<alexlehm>not sure if the videos are captured by default
12:28:40Froxcey (Froxcey) joins
12:32:58Froxcey quits [Ping timeout: 240 seconds]
12:36:07etnguyen03 (etnguyen03) joins
12:58:08etnguyen03 quits [Client Quit]
13:04:32Froxcey (Froxcey) joins
13:12:50etnguyen03 (etnguyen03) joins
13:16:18Froxcey quits [Ping timeout: 240 seconds]
14:11:43Froxcey (Froxcey) joins
14:31:18etnguyen03 quits [Client Quit]
14:33:43PredatorIWD2 quits [Read error: Connection reset by peer]
14:36:34PredatorIWD2 joins
14:43:53etnguyen03 (etnguyen03) joins
14:46:29Naruyoko quits [Quit: Leaving]
14:50:11dimkauzh (dimkauzh) joins
14:57:55dimkauzh quits [Client Quit]
15:23:26Froxcey quits [Remote host closed the connection]
15:28:18<nukke>https://arstechnica.com/gaming/2024/11/ipod-fans-evade-apples-drm-to-preserve-54-lost-clickwheel-era-games/#gsc.tab=0
15:38:07Froxcey (Froxcey) joins
15:39:31Froxcey quits [Remote host closed the connection]
15:44:06Naruyoko joins
15:48:15Froxcey (Froxcey) joins
15:52:55Froxcey quits [Ping timeout: 260 seconds]
15:54:50Froxcey (Froxcey) joins
15:57:37Froxcey quits [Remote host closed the connection]
16:06:28Froxcey (Froxcey) joins
16:08:59Juesto (Juest) joins
16:11:18Juest quits [Ping timeout: 240 seconds]
16:11:18Juesto is now known as Juest
16:20:12Terbium quits [Remote host closed the connection]
16:20:44Terbium joins
16:30:56Froxcey quits [Remote host closed the connection]
16:45:21dimkauzh (dimkauzh) joins
16:57:07Froxcey (Froxcey) joins
17:09:40Froxcey quits [Remote host closed the connection]
17:09:43Froxcey (Froxcey) joins
17:15:16goos joins
17:23:04Froxcey quits [Remote host closed the connection]
17:26:54Froxcey (Froxcey) joins
17:28:41MetaNova quits [Remote host closed the connection]
17:31:06MetaNova (MetaNova) joins
17:32:37MrMcNuggets quits [Quit: WeeChat 4.3.2]
17:32:38Froxcey quits [Ping timeout: 240 seconds]
17:39:41<@JAA>Barto: Right, I think you mentioned that. Now I wonder whether it's connected to this.
17:44:12goos quits [Client Quit]
17:58:05dimkauzh quits [Remote host closed the connection]
17:58:48dimkauzh (dimkauzh) joins
17:59:42dimkauzh quits [Client Quit]
18:02:15<eggdrop>[remind] kiska: downsample influxdb
18:14:10BornOn420 quits [Remote host closed the connection]
18:14:10sec^nd quits [Remote host closed the connection]
18:14:11HackMii quits [Write error: Broken pipe]
18:14:11SootBector quits [Write error: Broken pipe]
18:14:31sec^nd (second) joins
18:14:31SootBector (SootBector) joins
18:14:37HackMii (hacktheplanet) joins
18:14:53BornOn420 (BornOn420) joins
18:50:25goos joins
18:50:40useretail quits [Quit: Leaving]
18:51:21<nicolas17>JAA: https://gitlab.com/wireshark/wireshark/-/commit/ecffa7d1f6b75d37562a468e84f17a132cd0db14
18:51:48goos quits [Client Quit]
18:53:47<@JAA>Nice
19:06:05<steering>pabs: not much better
19:06:37<steering>it took me to this... https://i.imgur.com/1npCAEV.png
19:07:18<steering>in fact privacydev is the only one its redirecting me too and yeah just broken
19:07:21<steering>some 500, some empty pages
19:11:46sralracer quits [Ping timeout: 255 seconds]
19:15:53<immibis>does yt-dlp have a way to embed the format ID in the filename? including when it's a mux of two formats?
19:16:20<immibis>Barto: for the spoofing attack? terrorists win! btw this attack can be done against anyone, including you when you're not running a tor relay
19:22:55immibis wonders what would happen if one of those cybersecurity companies sent themselves an automated abuse report
19:25:25<nicolas17>immibis: I read of someone who got a phishing email to his work email, he reported it to RBLs and to the ISP used by the sender, and it turns out it was a badly-executed phishing test hired by his company and the cybersecurity company was pissed about getting blocked worldwide
19:25:59<steering>immibis: yeah, %(format_id)s
19:26:09<steering>[Merger] Merging formats into "313+251.webm"
19:26:58<@JAA>nicolas17: Test passed, I guess. :-)
19:27:20<steering>all the other usual things work too like %(format) if you want a longer description of it etc
19:27:52<nicolas17>I think you need the s
19:28:00<steering>yeah, +s
19:40:02<immibis>thanks, i didn't test it, i just searched the documentation and didn't seem to find one
19:46:55<immibis>yup it's not documented in the output templates section
19:47:04<immibis>glad i'm not blind
19:54:40Froxcey (Froxcey) joins
19:54:55Froxcey quits [Read error: Connection reset by peer]
19:54:55sralracer joins
19:56:25<steering>it is.
19:56:49<steering>>All the fields in Filtering Formats can also be used
19:57:02<steering>:)
19:57:19<steering>it's just buried in there and very missable
20:03:16Froxcey (Froxcey) joins
20:13:26linuxgemini quits [Quit: getting (hopefully fresh) air o/]
20:13:56linuxgemini (linuxgemini) joins
21:05:57qwertyasdfuiopghjkl quits [Client Quit]
21:07:45qwertyasdfuiopghjkl (qwertyasdfuiopghjkl) joins
21:11:39<@JAA>Oops: https://www.wired.com/story/synology-zero-click-vulnerability/
21:20:45wickedplayer494 quits [Ping timeout: 260 seconds]
21:21:48wickedplayer494 joins
21:26:56BlueMaxima joins
21:30:29<steering>>The researchers tell WIRED that while the systems can be set up with a gateway that requires credentials to access them, the part of the photo application that contains the zero-click vulnerability does not require authentication
21:30:33<steering>yucko
21:34:14<steering>I just noticed this in my openvpn logs: 2024-11-02 05:36:59 us=789504 read UDPv4 [EHOSTUNREACH]: No route to host (fd=6,code=113)
21:34:23<steering>how would a UDP read cause no route to host...?
21:34:30Froxcey quits [Remote host closed the connection]
21:35:24Froxcey (Froxcey) joins
21:39:38Froxcey quits [Ping timeout: 240 seconds]
22:00:33Froxcey (Froxcey) joins
22:06:21Froxcey quits [Remote host closed the connection]
22:06:27Froxcey (Froxcey) joins
22:21:49Froxcey quits [Remote host closed the connection]
22:22:47Froxcey (Froxcey) joins
22:23:29Froxcey_ joins
22:23:29Froxcey quits [Read error: Connection reset by peer]
22:31:25Chris50100 (Chris5010) joins
22:33:40Chris5010 quits [Ping timeout: 260 seconds]
22:33:40Chris50100 is now known as Chris5010
22:38:26Chris50102 (Chris5010) joins
22:40:40Chris5010 quits [Ping timeout: 260 seconds]
22:40:40Chris50102 is now known as Chris5010
22:43:05<immibis>steering: perhaps a delayed error report from a previous write
22:47:20<steering>hmm, is that a thing? guess that kinda makes sense
22:47:49<steering>like the write call succeeded but then I got back some ICMP error packet, so it's indicated on read?
22:48:04<nicolas17>when would it give you the error otherwise?
22:48:21<steering>*shrug* that's why I guess it kinda makes sense
22:48:50<nicolas17>send() would have to block for a minute to wait for a potential error otherwise ^^
22:52:31tech234a (tech234a) joins
22:59:39Froxcey_ quits [Remote host closed the connection]
23:05:24etnguyen03 quits [Quit: Konversation terminated!]
23:19:20useretail joins
23:36:13etnguyen03 (etnguyen03) joins
23:49:01Bleo182600722719623 quits [Quit: Ping timeout (120 seconds)]
23:49:19Bleo182600722719623 joins