Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Submission + - Ask Slashdot: VPN solution to connect two mixed environment households? 1

RavenLrD20k writes: My first Ask Slashdot, so be gentle... I am a programmer by trade with a significant amount of training as a Network Administrator (AAS in Computer Networking). I have no problem with how to build three or four separate networks in each location and make them route over the internet. My weakness is in trying to setup a VPN for a secured two way connection between location A and location B, both mixed OS environments, with the requirement that all of the internet traffic on B gets routed through A first. I've already looked at some boxed solutions, such as LogMeIn Hamachi, but there hasn't been much in the way of mixed environment support.

Some background: Due to recent events it's become necessary for me to have remote access to all of my Parents' computers which are about 4 hours away(location B) from my home location(location A). This is to facilitate me being able to log in and apply patches and security updates without requiring someone on the other end sending me Desktop Sharing invites (I'm already going to be upgrading their 2 systems to Windows 7 Ultimate on my dime for this purpose). The ISP for Location B also seems to be blocking the Desktop Sharing ports as this method has completely stopped working for us without notice, and router configs have been verified as forwarding the necessary ports. Location B also has 2 grandchildren that will have a Windows 7 Home Edition Laptop (for MS Office based classwork), a Linux Mint Machine (to start, he has full reign to do whatever he wants to this machine after initial setup with the understanding that if he "breaks" it, he fixes it), and several BeagleBone or R-Pi machines for my Son's experiments while he's visiting for the summer.

Location A has two networks. First is the one with the public IP that I run my Linux servers and physically connected Desktop on. This network also has a wireless interface that allows gaming machines and phones on the North side of the house to connect to. Network two is behind the NAT and runs a dual-band wireless connection for devices on the south side. I would rather not have this second network get internet access through the VPN but through the traditional means.

Location A has a 150/30 cable connection with a 2TB cap. Location B has a 20Mb/s symmetrical uncapped Fiber connection. I also have a VPS "in the cloud" running CentOS which has a 1Gbps Inbound 20Mbps(1Gbps burstable) Outbound connection which may be repurposed for this if necessary. I figure this to be common sense but I would prefer that the the connection between the locations be routed as opposed to bridged as to avoid the issues that come with sending broadcast packets over the internet.

As I said, I primarily want this to be able to remote into my parents' systems to provide maintenance and support instead of having to budget an emergency trip when things go awry. On top of this I'd also like some way to be able to monitor/control my son's online activities while he's away (hence my desire to route at least his traffic, if not all Location B internet traffic, through Location A). Also note: I'm not a helicopter parent by any means and only monitor once in a while to get a general idea of what his online trend is; and the extent of "control" is if grandpa and grandma say he needs time off the computer for x days for bad behavior or whatever, I want to be able to enforce that rule where he won't be able to sneak around while they're in bed. This connection will not have any firewalling or blocking enabled by default. I want everyone to have complete open access to the full internet (this too is to help educate my son in smart browsing/chatting and encourage "you break it, you fix it").

Comment Re:Responses (Score 2) 251

So how do you encrypt this UUID?

You don't need to. Paranoid about it? Wipe the UUID field from the database upon successful verification of the email so it can't be queried against in the future. However it would be better to just do a sanity check in the code that if there's a boolean 1 in the "emailConfirmed" field after querying for the UUID, just notify the user that the account has already been confirmed and doesn't need to be again.

And what do you send for a password reset?

An email to the address on file that has a link to the password reset possibly pre-filling the userID field, but I tend to make the user type that in themselves. If they don't remember the userID... then they'll need to know other pertinent information that the account was created with, otherwise new account time. After the password is reset, then send a confirmation that only states this fact and not giving any identifying information in it beyond that. The same thing you should be doing for any type of change made at the user's account level. If the user is changing their email address, send a confirmation to both the old and the new address that it has been changed, then also reset emailConfirmed to 0, regen the UUID, and force the user to verify the new address, following the same procedure as if it were the first time.

Comment Re:Goodbye free speech (Score 1) 210

But it doesn't stop Jane from decking you if you scream "Jane, you ignorant slut!" at her. Nor does that stop you from suing her for the medical costs associated with the black eye resulting from you being decked. Nor does that stop her from counter-suing for the slanderous defamation of her character. It only stops the government from putting you in prison for the rest of your life simply because of your opinion on Jane's promiscuity.

Comment Re:Is Haselton going to jail? (Score 1) 187

How you test for a brute-force vector without conducting a full brute force attack:

Hey, United, I was able to try 10 user/PIN combinations within 30 seconds of each other and did not hit any timeout walls or seeming account blocks. I was also able to directly use my real account/PIN combination on the 11th attempt that I manually did 5 seconds later and was able to get full access to my account. You might want to take a look at this to make sure that on a proper brute-force scale you're not caught with your pants down.

Comment Re:No brute-forcing murky... or clear? (Score 3, Insightful) 187

I have an idea. How about you learn something before you talk out of your ass? Brute force has never, in the entire lifetime of the phrase, meant that you were pegging a server while you are trying every possibility for the password on an account. Hell, if I send a username and next-in-series password at a rate of one every 20 minutes, that's still classified as a brute force attack, and unless the server is really anemic, there's no chance in Hell that the server is going down. If I'm doing that same type of attack at a rate of 200 attempts per second, or even 2000 attempts per second, that's still not going to blip much on the server's CPU unless it's already bogged with another process, and those are STILL classed as brute force.

The type of attack you're looking for is Distributed Denial of Service, which isn't generally for breaking into accounts but taking the server down with an overwhelming number of requests or pings that the server doesn't have the resources to be able to respond to any further requests.

Submission + - Warner Bros. Halts Sales of AAA Batman PC Game Over Technical Problems (polygon.com)

An anonymous reader writes: The Batman: Arkham series of video games has been quite popular over the past several years. But when the most recent iteration, Batman: Arkham Knight was released a couple days ago, users who bought the PC version of the game found it suffered from crippling performance issues. Now, publisher Warner Bros. made an official statement in the community forums saying they were discontinuing sales of the PC version until quality issues can be sorted out. Gamers and journalists are using it as a rallying point to encourage people to stop preordering games, as it rewards studios for releasing broken content.

Submission + - NVIDIA Begins Supplying Open-Source Register Header Files (phoronix.com)

An anonymous reader writes: NVIDIA's latest mark of their newly discovered open-source kindness is beginning to provide open-source hardware reference headers for their latest GK20A/GM20B Tegra GPUs while they are working to also provide hardware header files on their older GPUs. These programming header files in turn will help the development of the open-source Nouveau driver as up to this point they have had to do much of the development via reverse-engineering. Perhaps most interesting is that moving forward they would like to use the Nouveau kernel driver code-base as the primary development environment for new hardware.

Comment Re:Valve is the lever moving the PC gaming world (Score 1) 57

Can't tell if you're willfully ignorant on this or just trolling.

Valve doesn't have a lot of games on Steam. 3rd Party development houses chose to use Steam as a Distribution/DRM platform. Valve has not one iota of power (yet) to dictate that games developed by 3rd parties must also have Linux Binaries. The only binaries that are in direct control of Valve are games that Valve has developed. This is not to say that at a point in the future where Valve believes that Steam as the sort of clout that all other developers cannot do without their service, Valve wouldn't make the terms that in order to make use of the Steam platform for their games, 3rd party devs must provide working Linux binaries as well.

To put it more accurately and succinctly, Valve cannot say "We, as developers, have a lot of games on Steam," since they only have direct claim to ~30 out of the "10,000". They can say, however "We, as a service, have hundreds of developers that use our platform to allow users to purchase thousands of their games (not Valve's games) through that platform." There's a league of difference between those two concepts of ownership over the binaries.

Comment Re:Valve is the lever moving the PC gaming world (Score 4, Interesting) 57

You seem to be confused between games that Valve created versus games created by other companies that use Valve's distribution service named Steam. There's only a small handful of games distributed through Steam that were actually developed by Valve themselves; almost 30 if you include comercial mods and expansions.

Comment Re:Infinity (Score 1) 1067

So...when you graph the equation 5/x, where X hits zero a line is drawn horizontally and vertically with arrows indicating infinity in all directions, with the two curves shooting off the page of it at the positive and negative points where x no longer equals zero? Funny...I always thought that the 0 lines are completely devoid of any marks, specifically to denote that there is no defined value, infinity or otherwise.

Comment Re:Infinity (Score 1) 1067

In the most trivial simplification x/0 will be either positive or negative infinity, depending on the sign of x. If x=0 then we can't even say that much.

Actually, in any possible case of x, the result is always both positive AND negative infinity...and it is also always neither. As I mentioned elsewhere, divide by zero is essentially quantum superposition at work. The denominator being zero means that there is no "observer" for the numerator to collapse into a definitive form...and therefore there is no possible way to define the entire equation. Undefined != infinity. Undefined == Undefinable.

Slashdot Top Deals

The moon is made of green cheese. -- John Heywood

Working...