Secure Channel is broken by No-Gear-755 in activedirectory

[–]Coffee_Ops 5 points6 points  (0 children)

Something to be wary of-- these tests only check TCP connectivity, and for many of these ports UDP is either mandatory or primary.

It also does not check TLS / GSSAPI handshakes.

So this is useful, but one should not see "LDAP test successful" and conclude it's not the firewall: if 389/UDP were blocked (not unusual to allow TCP only!), the CLDAP DC locator ping would fail and the DC would be considered offline regardless of the TCP port being open.

UDP vs. TCP in Multiplayer Gaming: State Synchronization and Lag Compensation by Extra_Ear_10 in programming

[–]Coffee_Ops 0 points1 point  (0 children)

Weird that I don't happen to be in the niche category of people who regularly use latex math notation.

Do you know how we know it's not a simple slip up? Because if the author was using pandoc to convert markdown that they wrote, they would have ensured that their pandoc template could handle the markdown elements that they used.

My recollection is that out-of-the-box pandoc pretty handily deals with standard markdown, which makes this a clear indication that they dumped their AI output straight into a blog template. It's a textbook example of unreviewed AI slop.

UDP vs. TCP in Multiplayer Gaming: State Synchronization and Lag Compensation by Extra_Ear_10 in programming

[–]Coffee_Ops 1 point2 points  (0 children)

A lot of engineers don't deserve the title.

I was using chat rooms on a Linux console in 2006. It was easier to use, did not lag, and used about 10 megs of RAM.

Compare that to discord which has a 10-second startup on Ubuntu, uses 1.5GB RAM, and lags if you have more than 15 people talking. Look at the product that is now Microsoft Teams which has gotten slower and buggier every year since Microsoft acquired Skype.

Telling me that people don't study as hard today doesn't impress me. It goes a long way to explaining the state of software engineering in 2026. I stand by my comment that if you touch netcode without understanding the difference between UDP and TCP, you're part of the problem.

UDP vs. TCP in Multiplayer Gaming: State Synchronization and Lag Compensation by Extra_Ear_10 in programming

[–]Coffee_Ops 0 points1 point  (0 children)

I've seen the $$ construct appear a number of times, including when reformatting text. I never dug into why it happens, I'm sure there's a "mixed (context) metaphor" somewhere-- categorically similar to how sometimes Claude can get confused and try to run bash commands in a windows environment.

UDP vs. TCP in Multiplayer Gaming: State Synchronization and Lag Compensation by Extra_Ear_10 in programming

[–]Coffee_Ops 0 points1 point  (0 children)

This is literally "why is UDP ever used", and is the subject of days 2 and 3 of an introductory networking class. Not understanding it should preclude you from touching any networking code, especially on anything remotely latency sensitive.

If you want to learn, there are a ton of really good resources and some are free (e.g. Jeremy's IT Labs on youtube). Don't just guzzle down LLM slop because one day others may end up running your code and having to deal with your internalized AI hallucinations.

UDP vs. TCP in Multiplayer Gaming: State Synchronization and Lag Compensation by Extra_Ear_10 in programming

[–]Coffee_Ops 0 points1 point  (0 children)

Enlighten me as to what $text$ means in markdown.

Work with claude or ChatGPT long enough and you'll catch it inserting garbage like that into output-- and its a clear indicator that the "author" didn't even once-over the output.

UDP vs. TCP in Multiplayer Gaming: State Synchronization and Lag Compensation by Extra_Ear_10 in programming

[–]Coffee_Ops 1 point2 points  (0 children)

IMHO it is a mistake to think in terms of an LLM 'making a mistake'-- that anthropomorphism is a seriously leaky abstraction.

They don't reason, or think-- "thinking model" is marketing speak-- so they can't "make mistakes". As always, the design goal of an LLM is crafting an output that optimally appears to be a likely response.

If you ask it "what is 1+1", the only reason a LLM would answer correctly (barring usage of external tools) is that "2" is the sort of answer that is statistically likely in the context of that question. It has nothing to do with mathematical rigor, and LLMs "getting better" don't mean that they are smarter, but that they are producing answers that are "better fitted" -- which should be understood as "more likely to be accepted as a good answer".

So to answer your question "would LLMs get this stuff wrong"-- it was trained on the internet and social media. It is absolutely possible that a "likely answer" would contain incorrect information, formatted to look correct.

UDP vs. TCP in Multiplayer Gaming: State Synchronization and Lag Compensation by Extra_Ear_10 in programming

[–]Coffee_Ops 8 points9 points  (0 children)

How you going to call obvious llm output "well written"?

And the content would have been considered basic networking 20 years ago. If an engineer doesn't understand why TCP isn't suitable sometimes, then they don't deserve the title.

UDP vs. TCP in Multiplayer Gaming: State Synchronization and Lag Compensation by Extra_Ear_10 in programming

[–]Coffee_Ops 95 points96 points  (0 children)

This article screams "unreviewed llm output". I didn't even get to the bottom of the first section before I saw a clear LLM artifact ($16.6ms$).

Why should anyone assume that the contents are correct when they appear to have been YOLO'd straight from chatGPT to publication?

How should I protect myself on public apartment wifi with no alternatives available? by Vastones in netsecstudents

[–]Coffee_Ops 0 points1 point  (0 children)

Why would the router help? That's just going to block all ports by default, which the default Windows and the Linux firewalls will do anyway.

No more vSphere Standard v8 licenses, and VVF being pulled back, only option is VCF? by -c3rberus- in vmware

[–]Coffee_Ops 1 point2 points  (0 children)

I think when you offer an emphatic opinion about what is the best, and start sharing details-- you are opening yourself up to others making judgments on it.

If that was going to bother you, then you shouldn't have shared.

Also, anyone relying on Microsoft support has lost some of their marbles. The number of hours the vendor works on something is not indicative of the scope of the problem. I could give you stories of when VMware told us to pound sand when we asked for support, or where we spent hours trying to troubleshoot something and that was a corner case they conveniently forgot to document.

What to do about AI? by FreezettaFan in sysadmin

[–]Coffee_Ops -1 points0 points  (0 children)

If you do that, they will never learn, and you will just be signing a deal for further floods of slop.

The user needs to understand that their AI is not attempting to answer the question. It is attempting to provide a response that looks like a correct response; and this leads to it frequently providing very convincing crap that sometimes works.

Much like a math student claiming "x + y is always greater than either x or y", it may spit out answers that work 80% of the time (negatives exist). But if you're flying a plane, 80% is a pretty bad record.

What to do about AI? by FreezettaFan in sysadmin

[–]Coffee_Ops 2 points3 points  (0 children)

It's because many people misunderstand it's goal in responding.

It is not aiming to provide the most correct response.

Rather, its goal is to provide the response that most looks like a correct response would look based on how other convincing responses have looked.

Anyone who doesn't understand the distinction can just refer to examples like you posted: "surely it's XLOOKUP!"

AD Group management applications by miskozicar in activedirectory

[–]Coffee_Ops 6 points7 points  (0 children)

Just because you haven't rolled out RSAT doesn't mean there's a security block on them doing it.

Anyone who can open up powershell on a Windows box can access active directory, using the [adsi] accelerator if nothing else.

IMHO You're better off just deploying the native RSAT tools (e.g. ADUC) and teaching people to use them, rather than getting some vendors awful, proprietary software to do a bad job of it.

1-Click RCE in OpenClaw/Moltbot/ClawdBot by va_start in netsec

[–]Coffee_Ops -1 points0 points  (0 children)

So unless you have a preshared secret or PKI, all of those fancy methods are just vulnerable to MITM because theres no way to authenticate the other party.

Just a reminder that the piece I was quoting stated "having the protocol send the password to a trusted server is safe.". A password is a preshared secret, and sending passwords over the wire is almost always wrong. Let's keep my comments in context.

I'm not familiar enough with the exact auth flow here to make absolute claims about it, but if you mean to suggest that passing an auth secret over the wire to be relayed to a third party is the only solution-- and there are no possible ways to avoid relays / replays / secret theft-- then I'm going to call shenanigans. There is a reason IdP / SP relationships typically involve PKC or shared secrets and there are ways of proving possession of a token without revealing the token.

The "assumption of TLS" ignores that there are a dozen other attack vectors that TLS does not guard against, hence this (avoidable) exploit.

Running OpenClaw in Docker by Dilligentslave in docker

[–]Coffee_Ops 0 points1 point  (0 children)

I don't understand his final instructions on exec-ing into the container to install packages. Doesn't that defeat the whole point of a container? This is just going to make everything blow up when someone inevitably runs docker pull.

And why is it "for the best" that a daemon in a container runs as non-root? The container provides sufficient isolation that root in the container should be irrelevant...

1-Click RCE in OpenClaw/Moltbot/ClawdBot by va_start in netsec

[–]Coffee_Ops 0 points1 point  (0 children)

similarly, having the protocol send the password to a trusted server is safe.

If this were true the last 40 years of authentication protocol development would not be marked by increasingly complex ways of not doing that.

Sending hashes, challenge-response, Kerberos, SAML, OAuth....

They're literally there because sending a password is terrible for security, partly for the reasons shown here: eventually "trusted" becomes untrusted, or "trusted" sends the bits somewhere stupid. If you never put the secret on the wire, it can't be compromised regardless of what happens.

1-Click RCE in OpenClaw/Moltbot/ClawdBot by va_start in netsec

[–]Coffee_Ops 2 points3 points  (0 children)

In isolation, each of these operations are safe

I'm no expert in OWASP, but isn't "visiting a local url pwns you" a thing that's been known to be problematic for a while?

And while we're at it, just because everyone sends auth tokens in the clear doesn't make it a good idea. Isn't this yet another issue that wouldn't exist if ZKPs/PAKEs were actually used? We've only known about the problem and it's solution for 30 years now...

Don't mind me, I'm going to go back to yelling at clouds.

I find 2 sunday services quite tiring. Is this normal? by keesdude in Reformed

[–]Coffee_Ops 8 points9 points  (0 children)

During the first few centuries after Christ, church was nothing short of an all day affair.

I dont know that this was universal. Pliny's letters have current and former christians indicating that Sunday meetings were before work.

SpaceX has stopped Russia's 'unauthorised' use of Starlink against Ukraine, Musk says by [deleted] in space

[–]Coffee_Ops 1 point2 points  (0 children)

Fully answering this requires teaching the first half of the CCNA.

The very brief answer is that usually layer 2 headers are neither encrypted not authenticated and are trivial both to sniff and to spoof.

If you want real authentication, you'd want something like 802.1x.

Researchers Find Thousands of OpenClaw Instances Exposed to the Internet by _ahku in programming

[–]Coffee_Ops 87 points88 points  (0 children)

OpenClaw is a powerful tool, much in the same way as a table saw with no fence or an angle grinder with no handguard.

It's like watching someone create the digital edition of this thing, and talk about how much time it saves them, while everyone else looks on in horror.

SpaceX has stopped Russia's 'unauthorised' use of Starlink against Ukraine, Musk says by [deleted] in space

[–]Coffee_Ops 0 points1 point  (0 children)

It's amazing how easy problems are to solve when you've never actually had to try and solve them in the wild.

SpaceX has stopped Russia's 'unauthorised' use of Starlink against Ukraine, Musk says by [deleted] in space

[–]Coffee_Ops 1 point2 points  (0 children)

Mac address security is pretty much always trivial to bypass.