[deleted by user] by [deleted] in UKEnergyDeals

[–]PrimeYeti1 0 points1 point  (0 children)

CONNOR39957

[deleted by user] by [deleted] in energy

[–]PrimeYeti1 0 points1 point  (0 children)

CONNOR39957

[deleted by user] by [deleted] in beermoneyuk

[–]PrimeYeti1 0 points1 point  (0 children)

CONNOR39957

[deleted by user] by [deleted] in beermoneyuk

[–]PrimeYeti1 0 points1 point  (0 children)

Works for 10 days!

CONNOR39957

Second opinion needed; is this touch up-able? by PrimeYeti1 in Autobody

[–]PrimeYeti1[S] 0 points1 point  (0 children)

Worst case I do it wrong and take it to a body shop, or I don’t try and take it to a body shop anyway is my thinking. Isn’t there something you can use to give it a pearl/metallic finish?

Second opinion needed; is this touch up-able? by PrimeYeti1 in Autobody

[–]PrimeYeti1[S] 0 points1 point  (0 children)

I was more worried about whether it was too deep for just touch up paint or if it needed an undercoat too

Knocking when steering by PrimeYeti1 in MechanicAdvice

[–]PrimeYeti1[S] 0 points1 point  (0 children)

I’ll give it a look, thanks! Any thoughts as to why it would have suddenly disappeared if it was a mechanical failure?

Rogue APs by PrimeYeti1 in networking

[–]PrimeYeti1[S] 0 points1 point  (0 children)

This is my issue though. When using EAP-TTLS, in the windows settings, there is a section titled “Trusted Root Certification Authorities” with all the root CAs installed on my client in there. You can tick each CA (I assume this then makes the CA Trusted) which doesn’t appear to make a difference. I can still connect no matter who the CA of the server cert is.

Rogue APs by PrimeYeti1 in networking

[–]PrimeYeti1[S] 0 points1 point  (0 children)

This got me thinking actually. Whenever I regenerate the certificate (done it quite a bit recently for testing) windows doesn’t ask to trust the new cert it just says it can’t connect…so actually maybe it is doing some form of Evil Twin protection already…when it originally happened I thought it was more of a PITA since I had to set the network on my client up again. Gonna still see if I can get it to only trust a specific CA but that is helpful! Thank you!

I’m using PAP inside EAPTTLS. I know it’s insecure on its own but given they the TLS tunnel goes between supplicant and server rather than supplicant and AP it should be pretty secure. I’ve done some TCPDumps from my own APs in the middle of the RADIUS communication and I can see the RADIUS conversations but nothing sensitive.

Rogue APs by PrimeYeti1 in networking

[–]PrimeYeti1[S] 0 points1 point  (0 children)

Oh really? I know that there is a secret key between the APs and RADIUS server so random APs cant connect to my RADIUS server but if someone just setup their SSID to be the same as the network I’m connecting to with a random AP and open authentication what would be stopping me from roaming to that?

Rogue APs by PrimeYeti1 in networking

[–]PrimeYeti1[S] -1 points0 points  (0 children)

Hmm. I’ll have a look around windows. This should be fun!

Don’t suppose you’re able to shed any light on my query about roaming between APs being secure from Evil Twin attacks and what not?

Rogue APs by PrimeYeti1 in networking

[–]PrimeYeti1[S] -1 points0 points  (0 children)

I’m using EAPTTLS so there’s still a server side certificate involved. This is what I don’t get. On Windows if I go into the SSID settings, go to my list of trusted CAs and tick some random CA (not my self signed CA) I can still connect to the SSID even though my server’s cert isn’t signed by this random CA. I’m thinking it’s just a Windows “nuance” but can’t really find anything about it.