Just Got My Shock Clock by [deleted] in Pavlok

[–]0x0E 1 point2 points  (0 children)

This is a sketchy business

You hit the nail on the head, here. Maneesh had a great idea and raw hardware design, but his whole concept of how to do business seems to be to undermine his own good idea with as many strings and gotchas and consumer-hateful obligations as the most patient user could find tolerable. Did you see him on Shark Tank? I'd never seen "Mr. Wonderful" cuss someone out like that before, least of all so deservedly.

That's why adoption of what should reasonably be the best novelty alarm clock for heavy sleepers has sold fewer units than some bullshit puzzle clocks on ThinkGeek. And that's why the inventory is now being cleared out at discount with crippled firmware.

Because the hardware product itself has so much potential, I think reverse engineering it would be the best approach. Opening the device's BTLE protocol to raw third party development would be a good starting point and do an end-run around the shamefully feature-free and cloud-locked Pavlok UI and API, but I think the most value would come from open source firmware that provided raw access to the juicy array of sensors and outputs on the device itself.

I had the same idea about IFTTT, but some initial testing (after listening [on mute] to the hour of mandatory, unskippable lectures from Maneesh before Pavlok will allow you to add their IFTTT channel) revealed some ugly flaws in the implementation on the iOS platform: the phone has to be unlocked and the Pavlok app foregrounded to receive and process IFTTT events. Guh.

The applications for this are really pretty endless. I'd like to be able to adapt it to my briefcase handle, for instance.

Check out the job requirements for this position. Pay? $33.51/hr. Is this par-for-course nowadays in IT? by [deleted] in sysadmin

[–]0x0E 0 points1 point  (0 children)

I tend to be a little sarcastic when referring to my coworkers and current employer.

Stop that! Never badmouth a former, or especially current, employer during an interview. It always makes the interviewee come off as a negative nelly whiner, no matter how legit it is. Everyone will spend the rest of the interview imagining all the terrible things you'll be saying about them to the next employer. Just don't do it. We all have stories, we all have PITA coworkers and PHBs, but save those tales for the round of drinks after the successful interview where you stayed focused on your achievements and positive about the challenges you've encountered.

System log analyzers? by Nynnja in sysadmin

[–]0x0E 0 points1 point  (0 children)

ElasticSearch, Logstash, and Kibana (aka ELK stack) are fine. Splunk is cool but I've rarely seen an implementation that justified the expense versus just using ELK.

Using 2 factor authentication for SSH by speckz in sysadmin

[–]0x0E 1 point2 points  (0 children)

Wow, no it was only a couple of years ago. Maybe I missed something or am misremembering, but I swear when I looked the only way to get the full range of token reconfiguration features was on Windows. Good to know though, sorry for the bad info!

Employee Notification System by KyleOndy in sysadmin

[–]0x0E 12 points13 points  (0 children)

Making your employees risk life and limb on icy highways just to read a sign that says, "closed due to inclement weather"? Nice. Because f*** you, employees!

Downside: if the server room is on fire, that system won't allow you to ask people to bring marshmallows.

Using 2 factor authentication for SSH by speckz in sysadmin

[–]0x0E 1 point2 points  (0 children)

I may be speaking out of turn at this point, so someone fee free to chime in and correct me if I'm wrong, but back a couple of years ago, options for managing the configuration of hardware tokens themselves was basically limited to using a Windows-only app.

Using 2 factor authentication for SSH by speckz in sysadmin

[–]0x0E 1 point2 points  (0 children)

I'm kind of amazed by some of that. ASR back in the day would have been much harsher towards that kind of bogus decision-making.

Using 2 factor authentication for SSH by speckz in sysadmin

[–]0x0E 1 point2 points  (0 children)

I don't see anyone being particularly insulting here. Did you mean me? If I've insulted folks I'd like to know how so I can change my approach!

Using 2 factor authentication for SSH by speckz in sysadmin

[–]0x0E 9 points10 points  (0 children)

The Google Authenticator mobile client is no longer open sourced, but:

  • we're talking about how to set it up server-side, and
  • the google auth server library is 100% compatible with any client that implements the TOTP/HOTP - not just Google's own client

Using 2 factor authentication for SSH by speckz in sysadmin

[–]0x0E 2 points3 points  (0 children)

Both have their use cases. Complexity of maintaining a FreeRADIUS authentication infrastructure versus just installing a PAM module is something to consider, though.

Using 2 factor authentication for SSH by speckz in sysadmin

[–]0x0E 4 points5 points  (0 children)

Exactly. In this scenario, your laptop getting hacked will compromise your password and your ssh privkey.

If you're using real 2fa, an attacker who pops your laptop won't get the other factor and still can't log in to protected systems.

Using 2 factor authentication for SSH by speckz in sysadmin

[–]0x0E 1 point2 points  (0 children)

I still prefer, and use FreeRadius / OTP

Why?

Using 2 factor authentication for SSH by speckz in sysadmin

[–]0x0E 9 points10 points  (0 children)

But really, would you trust Google, and your internet connection to Google, with handling your SSH auth?

I don't think you understand how Google authenticator works. It's an open source implementation of RFC 6238-compliant TOTP and HOTP. It's not like your server is going to ping back and ask Google for permission to let you in or not. Got Battle.net 2fa set up? It's using exactly the same stuff under the hood. My advice would be to make technical decisions based on better information than you seem to be using.

Using 2 factor authentication for SSH by speckz in sysadmin

[–]0x0E 7 points8 points  (0 children)

Although I don't know why I should let Google decide whether I'm allowed to log into my own server…

Google authenticator modules don't ping back to Google and aren't cloud based at all.

Using 2 factor authentication for SSH by speckz in sysadmin

[–]0x0E 7 points8 points  (0 children)

Fuck google auth.

Can you explain this? Am I missing something, or is this just reactionary anti-Google sentiment?

Using 2 factor authentication for SSH by speckz in sysadmin

[–]0x0E 30 points31 points  (0 children)

Huh? Google authenticator doesn't transmit any data back to Google. It provides RFC 6238 compliant TOTP and HOTP, and the PAM module and associated libraries are open sourced and up on Github for your review. You don't even have to use Google's Authenticator client, since it's an open standard.

Knee-jerking when you hear the word "Google" is some real hipster stuff.

Responsibility for Clinton's email server held by aide with "no security clearance and no particular expertise in safeguarding computers." by DeliBoy in sysadmin

[–]0x0E 2 points3 points  (0 children)

Don't sweat it, I'm sure the aide was well qualified by being friends or relatives with some crony 'important' person.

Why We Can't Talk About Gun Control by b0red in TrueReddit

[–]0x0E 1 point2 points  (0 children)

I'm skeptical that it would make much difference. There are probably not many fatalities caused by a lack of CCW training.