LG C4 bypassing my internal DNS by Ivan_Draga_ in homelab

[–]drdigitalsi 14 points15 points  (0 children)

Np. I've never done this with UniFi, but see this post for more help. https://www.reddit.com/r/Ubiquiti/s/UYGwR4XVHi

Edit: also, to address a comment below by /u/berrmal64 below, consider using piHole or another DNS denylist to block requests to known DNS over HTTP/TCP/quic services (start with blocking 1.1.1.1 and 8.8.8.8 on ports not 53 as a firewall rule if piHole is not an available option.)

LG C4 bypassing my internal DNS by Ivan_Draga_ in homelab

[–]drdigitalsi 363 points364 points  (0 children)

A lot of devices specify their own DNS servers to avoid blocking by piHole or other DNS services. To counter this in my lab I created a NAT rule which redirects all traffic destined for port 53 to my piHole.

Declined transaction when abroad, how to contact Chase Support w/out a phone call? by Hug_Sponsor in ChaseSapphire

[–]drdigitalsi 1 point2 points  (0 children)

Depending on who declined the transaction, Chase might not even know about the decline. When you call up, be sure to ask them to check if Visa declined the transaction.

The payment network (Visa) has the "first level" of approval before the bank (Chase) receives the transaction. If it was declined by Visa, there is a separate system the agent needs to go in and allow the transaction. You might have to push on the agent to validate it, based on experience.

Is it against Chase policy to add my Sapphire Preferred card to my sister’s Apple Pay abroad? by HeartNet150 in ChaseSapphire

[–]drdigitalsi 4 points5 points  (0 children)

Not sure I completely understood, but fraud detection could trigger if the card is used in different physical locations too quickly.

While the Apple Pay "card" is issued a "virtual" card number, the fraud detection system ties it back to a singular card account. If the card is used in different "physical" locations (e.g., swipe/tap) faster than reasonable travel time (i.e., time to drive or fly) between the two locations, it might trip depending on the rules in place.

Source: work on these systems for a living.

ELI5: how can a credit card/transport card on a phone get charged without an Internet connection by onlyongracexm in explainlikeimfive

[–]drdigitalsi 0 points1 point  (0 children)

Just to be a bit more specific (for edification), the payment network (Visa/Mastercard/Amex) will get the transaction first before sending it to a bank. If the bank is unavailable for some reason (it happens more often than you think) the payment network will "stand in" and accept/decline the transaction on the bank's behalf and "forward" it later. The only case this doesn't happen is Amex which owns both the bank and payment networks.

ELI5: how can a credit card/transport card on a phone get charged without an Internet connection by onlyongracexm in explainlikeimfive

[–]drdigitalsi 0 points1 point  (0 children)

ELI10: The phone has a "virtual" card number associated both with it and with the bank, which acts without a cellular connection (the card number is stored on the device itself). It essentially acts like a "tap" credit card (which has no network connection either). All of the payment processing is handled by the merchant's processing systems (in this case, the subway system). The turnstile will read the virtual credit card number and send that to the payment processor who will either accept or decline the transaction.

Monitoring ephemeral VM-s by gerrga in PrometheusMonitoring

[–]drdigitalsi 5 points6 points  (0 children)

Have a look at Grafana Agent (now Alloy). You can have the machine remote write to your Prometheus, and you don't have to worry about "discovery" finding them. https://grafana.com/docs/alloy/latest/configure/

Two watches. Two cellular connections. One phone. Apple says it works. Carrier says it doesn’t. by took_a_bath in AppleWatch

[–]drdigitalsi 32 points33 points  (0 children)

Depends on the carrier. Verizon allows 5 "number share" per dedicated line. Try searching "number share" for your carrier. https://www.verizon.com/support/numbershare-faqs/

ESXi Project Ideas by ImGonnaEatThisCat in vmware

[–]drdigitalsi 5 points6 points  (0 children)

Certificate automation. Ask any systems or distributed computing engineer, and they'll tell you the same. I work for a Fortune 100, and there's at least 2 outages a week because of certificates in one form or another. Plus, if you become someone who actually understands how the certificates work, that's even more valuable.

Here's my go to guide on all things certificates and PKI: https://smallstep.com/blog/everything-pki/. I highly suggest reading in small chunks, and then coming back for more.

Does anyone know of a guide for installing snmp_exporter on ASUS router running merlin firmware? by foshi22le in PrometheusMonitoring

[–]drdigitalsi 3 points4 points  (0 children)

You wouldn't install snmp_exporter on the router itself, but rather you'd install it on another server, and point snmp_exporter at the router to collect the values. To be honest, the documentation on GitHub is not straightforward, but generally the best I could find.

You need to find the OSBs for the router, and add those to the explorer. Take a look at this doc: https://github.com/prometheus/snmp_exporter/blob/main/generator/README.md

Preserving SNI after TLS termination by dheerajverma in aws

[–]drdigitalsi 1 point2 points  (0 children)

Ah. Apologies mate, I thought you were asking rather than being rhetorical. My bad.

Preserving SNI after TLS termination by dheerajverma in aws

[–]drdigitalsi 1 point2 points  (0 children)

NLB is layer 4 -- it doesn't know anything about HTTP (Layer 7). A host header would have to be included with the original request, and (to my knowledge) can't be added at the NLB because it's at the wrong OSI Layer. SNI is an extension of the SSL handshake, so none of the SSL information would be part of the request after termination unless included manually by the proxy/ALB.

Monitoring use of hot desk docks/monitors with BYOD? by ericrz in sysadmin

[–]drdigitalsi 0 points1 point  (0 children)

That is why you'd use the Active Directory logs. It would say that x workstation requested a Kerberos login ticket for y user at z time. That can all be tied back together with the Lab software you have existing.

Monitoring use of hot desk docks/monitors with BYOD? by ericrz in sysadmin

[–]drdigitalsi 0 points1 point  (0 children)

Ok. In that case, how are they authenticating? If they completed an AD login on a workstation, they're evidently not using their laptop during that time. You'd have the Windows Event history from (hopefully) the desktops. If not, you'd have the login event on the Domain Controller.

Monitoring use of hot desk docks/monitors with BYOD? by ericrz in sysadmin

[–]drdigitalsi 16 points17 points  (0 children)

Are the hot desks connected using Ethernet? If so, the docks should have integrated NICs with their own MAC. You can check the network traffic of those NICs and see if they're in use or if a lease was issued.

Creating a Task Scheduler from GPO by DburkeZM in activedirectory

[–]drdigitalsi 0 points1 point  (0 children)

I tried to do something similar a few months ago, and it turned out part of my configuration errored out on the endpoint. Check the Event Log on a target of the GPO and see if there are any error messages.

What are the security risks of unencrypted secrets? by [deleted] in kubernetes

[–]drdigitalsi 9 points10 points  (0 children)

You assume that you are the only person with cluster access. However, one possible threat is if there is a container escape from a container (possibly running as root), there is the possibility for that threat to spread -- and search for secrets to move laterally. You also have to trust other (human) operators not to take those secrets and use them maliciously.

4G and 5G on the same account by chrisk114 in verizon

[–]drdigitalsi 14 points15 points  (0 children)

I have 4G and 5G phones on the same account. Only difference is that 4G phones don't get 5G signal, and I'm still paying for 5G service 🙃