• 1 Post
  • 94 Comments
Joined 2 years ago
cake
Cake day: December 28th, 2023

help-circle



  • Don’t use sonic walls, and also I don’t have any configured, so I can’t help you with any specifics other than other vendors.

    Just guessing, they might be doing some kind of network level exploit detection along with the VPN. My network team has that setup on our firewall (multi-zone, including VPN), and I’ve been called in on more than a few security calls triggered by network EDR. If they have people you can use in that kind of a scenario, it would probably be worth it (my CISO is always trying to get customers to buy into the service BEFORE we have to get on a call rather than after).



  • It sounds like your ubiquity and your ISP router are on the same LAN segment, which is not a good config.

    You should never have multiple DHCP servers configured unless you’re intentionally split braining your vlan (only ever done that for HA purposes and using half of the pool on each). Im pretty sure you need to have your ISP connected to your cloud gateway, and all of your gear connected to the ubiquity. Your ISP router should only see your ubiquity, and that’s likely a good part of the reason you can’t see all the DHCP leases on your ubiquity gear.

    Were I in your position, I’d probably disconnect everything and slowly reconnect stuff one piece at a time until you trip over what’s causing your issue. I doubt this is the case, but you could also have another DHCP server running on something you forgot about causing issues. Seen that many times before when doing small business network overhauls.







  • I use chatgpt when I care to, and while I was given a subscription by work, I’m not actively encouraged to use it. I really only use it for researching problems that Google search is too seo poisoned to help me with, or debugging scripts. Past that it doesn’t have much professional use for me, given how much time I spend validating output and insulting the AI for hallucinations and just generally being terrible at moderate tasks.

    Basic data interpretation can be pretty great though. I’ve had it find a couple problems I missed after having it parse log files.






  • And you still can’t can self certify.

    Skill issue, you’ve always been able to self certify. You just have to know where to drop the self signed cert or the parent/root cert you use to sign stuff.

    If you’re running windows, it’s trivial to make a self signed cert trusted. There’s an entire certificate store you can access that makes it easy enough you can double click it and install it and be on your way. Haven’t had a reason to figure it out on Linux, but I expect it won’t be super difficult.




  • So, if you would, help me out with the ‘why’ part

    It eliminates a single point of failure, can be used to bypass censorship, and allow for community support/engagement in a way that is harder to track and suppress (in that there’s no ‘central’ hub and you have to go after nodes individually. From an opsec point of view, you’re still broadcasting a signal that someone in range can pick up). Obviously it requires many devices to make a good mesh work, but short of DOSing every channel or just blowing out the signal space, it’s gonna be hard to take that down.

    I see it as something like tor or i2p, not something for general use at the moment, but definitely has good uses.