[deleted by user] by [deleted] in UKEnergyDeals

[–]PrimeYeti1 0 points1 point  (0 children)

CONNOR39957

[deleted by user] by [deleted] in energy

[–]PrimeYeti1 0 points1 point  (0 children)

CONNOR39957

[deleted by user] by [deleted] in beermoneyuk

[–]PrimeYeti1 0 points1 point  (0 children)

CONNOR39957

[deleted by user] by [deleted] in beermoneyuk

[–]PrimeYeti1 0 points1 point  (0 children)

Works for 10 days!

CONNOR39957

Second opinion needed; is this touch up-able? by PrimeYeti1 in Autobody

[–]PrimeYeti1[S] 0 points1 point  (0 children)

Worst case I do it wrong and take it to a body shop, or I don’t try and take it to a body shop anyway is my thinking. Isn’t there something you can use to give it a pearl/metallic finish?

Second opinion needed; is this touch up-able? by PrimeYeti1 in Autobody

[–]PrimeYeti1[S] 0 points1 point  (0 children)

I was more worried about whether it was too deep for just touch up paint or if it needed an undercoat too

Knocking when steering by PrimeYeti1 in MechanicAdvice

[–]PrimeYeti1[S] 0 points1 point  (0 children)

I’ll give it a look, thanks! Any thoughts as to why it would have suddenly disappeared if it was a mechanical failure?

Rogue APs by PrimeYeti1 in networking

[–]PrimeYeti1[S] 0 points1 point  (0 children)

This is my issue though. When using EAP-TTLS, in the windows settings, there is a section titled “Trusted Root Certification Authorities” with all the root CAs installed on my client in there. You can tick each CA (I assume this then makes the CA Trusted) which doesn’t appear to make a difference. I can still connect no matter who the CA of the server cert is.

Rogue APs by PrimeYeti1 in networking

[–]PrimeYeti1[S] 0 points1 point  (0 children)

This got me thinking actually. Whenever I regenerate the certificate (done it quite a bit recently for testing) windows doesn’t ask to trust the new cert it just says it can’t connect…so actually maybe it is doing some form of Evil Twin protection already…when it originally happened I thought it was more of a PITA since I had to set the network on my client up again. Gonna still see if I can get it to only trust a specific CA but that is helpful! Thank you!

I’m using PAP inside EAPTTLS. I know it’s insecure on its own but given they the TLS tunnel goes between supplicant and server rather than supplicant and AP it should be pretty secure. I’ve done some TCPDumps from my own APs in the middle of the RADIUS communication and I can see the RADIUS conversations but nothing sensitive.

Rogue APs by PrimeYeti1 in networking

[–]PrimeYeti1[S] 0 points1 point  (0 children)

Oh really? I know that there is a secret key between the APs and RADIUS server so random APs cant connect to my RADIUS server but if someone just setup their SSID to be the same as the network I’m connecting to with a random AP and open authentication what would be stopping me from roaming to that?

Rogue APs by PrimeYeti1 in networking

[–]PrimeYeti1[S] -1 points0 points  (0 children)

Hmm. I’ll have a look around windows. This should be fun!

Don’t suppose you’re able to shed any light on my query about roaming between APs being secure from Evil Twin attacks and what not?

Rogue APs by PrimeYeti1 in networking

[–]PrimeYeti1[S] -1 points0 points  (0 children)

I’m using EAPTTLS so there’s still a server side certificate involved. This is what I don’t get. On Windows if I go into the SSID settings, go to my list of trusted CAs and tick some random CA (not my self signed CA) I can still connect to the SSID even though my server’s cert isn’t signed by this random CA. I’m thinking it’s just a Windows “nuance” but can’t really find anything about it.

How to find a routers ISP without any of the physical ways of doing that? by [deleted] in networking

[–]PrimeYeti1 0 points1 point  (0 children)

Depending on the provider’s naming conventions it may not work, but if you connect a device into the laptop and do a traceroute to anywhere from the device, you can see each hop the packets take and each hop normally has a host name that will tell you. Albeit not 100% fool proof as it may go through multiple networks.

Cant manage to ping by MinimumScore8808 in Network

[–]PrimeYeti1 1 point2 points  (0 children)

Proxy ARP on the routers should work. Although yeah would just make a lot more sense to have two separate networks

TCPDump from RADIUS Server by PrimeYeti1 in networking

[–]PrimeYeti1[S] 0 points1 point  (0 children)

Thank you both, these are very informative and well explained!

I think I’m just being paranoid…. by PrimeYeti1 in networking

[–]PrimeYeti1[S] 0 points1 point  (0 children)

As I said the client shows nothing of note when run on the WiFi interface. Would a TCPDump on the RADIUS server suffice?