Sindarina, Finder of Edge Cases

@sindarina

Sparkly ops fairy, infrastructure sorceress. Paranoid, wee bit mental. Relentless doubter of everything. She/her.

NL/EU
Geregistreerd in juni 2009

Tweets

Je hebt @sindarina geblokkeerd

Weet je zeker dat je deze Tweets wilt bekijken? @sindarina wordt niet gedeblokkeerd door Tweets te bekijken.

  1. Vastgemaakte Tweet
    24 mei

    WARNING: This machine calls white people racist, privileged, and all sorts of other mean things! Because we are.

    Image from 'Lost In Space', with the robot, Will Robinson, and "DANGER, WHITE PEOPLE, DANGER!" as a caption.
    Deze collectie tonen
    Ongedaan maken
  2. I'm listening to the Con Law podcast, and it occurs to me that 'House Unamerican' makes for an excellent name. Band, rah rah, but you could also drop it into SF/F as something like 'House Unameric' or similar.

    Ongedaan maken
  3. Hey, look, when it's the establishment, all of a sudden it's possible to take death threats seriously, and they can be acted on. Who knew?

    Ongedaan maken
  4. Like, hell no. It has not been forgotten. It is known how you behave when criticised, you have not fixed that, you do not want to fix it ... but you come to me for a cookie? Fuck that performative allyship that wants to fix others, but skips yourself.

    Deze collectie tonen
    Ongedaan maken
  5. Which often includes the coopting of language. Like, an old friend of mine sent me an email this week touting his ally achievements, as something positive, when the last thing that happened between us was negative, related, and something he wants to 'agree to disagree' on 🙄

    Deze collectie tonen
    Ongedaan maken
  6. And the problem with that is that, if you see both, or more often more than 'both', it is a totally obvious pattern, and one that ruins any trust that they may have built on that side, because they show all the resistant behaviour with that same tenacity.

    Deze collectie tonen
    Ongedaan maken
  7. It's kind of amazing how often people show that they are making an effort to ditch certain habits in one area, making decent progress, and then absolutely, totally fuck it up on another axis, and digging in if that's pointed out to them. Like, you are doing the thing, again.

    Deze collectie tonen
    Ongedaan maken
  8. 10 uur geleden

    I wish more people knew about the "Rule of least power" and why it's important to consider when making technical choices.

    Ongedaan maken
  9. Especially against that monolithic Java backend that was supposed to be a fleet of microservices 😜

    Deze collectie tonen
    Ongedaan maken
  10. Seriously, rate limiting is ops magic. Against adversaries both foreign and domestic. Like those mobile developers who can't seem to wrap their heads around the fact that opening dozens of connections at once as soon as the app wakes up is not a solid strategy.

    Deze collectie tonen
    Ongedaan maken
  11. 6 uur geleden

    I watch my human patiently He looks at me confused I try to smell him carefully My gesture is refused

    Ongedaan maken
  12. Anyone remember the Zeus web server? Their URL is still in the 'ab' bench testing tool, and it's been jacked for goodness knows how long by now. I am having a tiny, tiny sad over this.

    Ongedaan maken
  13. The secret, when doing it at the packet level, is to not just rate limit the incoming connections, but also the responding packets, since keepalive means you can jam a ton of requests across a single connection ⏱

    Deze collectie tonen
    Ongedaan maken
  14. 27 jun.

    ladies and gentleman I am a homosexual

    Deze collectie tonen
    Ongedaan maken
  15. Me until I figured out how it actually worked 😏

    Deze collectie tonen
    Ongedaan maken
  16. Me when implementing rate limiting.

    Deze collectie tonen
    Ongedaan maken
  17. Deze collectie tonen
    Ongedaan maken
  18. Of course it turns out that you can just skip the individual TCP flag filters, and just catch all the invalid packets via a single connection tracking rule; "ct state invalid counter drop" 😜😄

    Deze collectie tonen
    Ongedaan maken
  19. Basically, it turns this; "-p tcp --tcp-flags SYN,RST SYN,RST" into this; "tcp flags & syn|rst == syn|rst" which then becomes this; "tcp flags & (syn | rst) | rst == syn | rst" when what you need is this; "tcp flags & (syn|rst) == syn|rst" Lovely syntax, isn't it? 😩🙄

    Deze collectie tonen
    Ongedaan maken
  20. And here's the XKCD 😄

    Deze collectie tonen
    Ongedaan maken
  21. This isn't about IPv6, but about TCP flags, by the way. The nftables input accepts the translated rules, but then turns it into something else entirely, because missing parentheses. See 'TCP flags matches turned into a mess' here;

    Deze collectie tonen
    Ongedaan maken

Het laden lijkt wat langer te duren.

Twitter is mogelijk overbelast of ondervindt een tijdelijke onderbreking. Probeer het opnieuw of bekijk de Twitter-status voor meer informatie.

    Je bent misschien ook geïnteresseerd in

    ·