On Mon, 8 Aug 2016, Morgan Blackthorne wrote:
So at $JOB we're running some Ubuntu 14.04 and 16.04 boxes that we'd like
to integrate with AD authentication. I've previously done this at $JOB-2
with a mix of nss-ldap, sssd, and pam_ldap, but we were supporting a lot of
different distributions.
W
On Fri, 8 Jul 2016, WK wrote:
On 7/7/2016 7:47 PM, David Lang wrote:
I started with Cyrus. How would Dovecot be any better? Does it have
back-end replication/clustering/failover like Cyrus does? or some other
feature that would let me replicate/split my mail repository?
I routinely have
On Thu, 7 Jul 2016, John Stoffel wrote:
"David" == David Lang writes:
David> On Wed, 6 Jul 2016, Yves Dorfsman wrote:
On 2016-07-06 10:17, Ted Cabeen wrote:
You've gotten lots of good answers. The only other one I'd want to mention is
that you can also host your per
hosted outside, with the two copies syncing
changes. Has anyone done anything along those lines?
David Lang
___
Tech mailing list
Tech@lists.lopsa.org
https://lists.lopsa.org/cgi-bin/mailman/listinfo/tech
This list provided by the League of Professional S
In those worlds, there isn't a wide variety of filesystems, and the
backup/restore software either targets the default filesystem, or it targets the
POSIX features and ignores anything else.
David Lang
___
Tech mailing list
Tech@lists.lopsa.org
On Tue, 7 Jun 2016, Edward Ned Harvey (lopser) wrote:
From: tech-boun...@lists.lopsa.org [mailto:tech-boun...@lists.lopsa.org]
On Behalf Of Steven Miano
There is information for how the mounts are currently configured (for
instance if you used defaults in /etc/fstab) located in: /proc/mounts on
n't implemented that many system calls
yet), but the advantage is that it isn't a separate environment and lets you run
unmodified Linux programs.
David Lang
___
Tech mailing list
Tech@lists.lopsa.org
https://lists.lopsa.org/cgi-bin/mailman/li
back (a couple months later) was a 200 line script with many functions
(all with severa lines of comments), which loaded the variable $command with
parts of my original script and then made system() calls.
But it was deemed 'supportable' for mission critical use :-/
David Lang
___
hinking if ksh or csh or *sh gives you more power/capabilities than bash you
shouln't use any shell.
David Lang
On Thu, May 12, 2016 at 4:29 PM, David Lang wrote:
On Thu, 12 May 2016, Jack Coats wrote:
Several friends hated bash (Bourne Again Shell) so they used sh (Bourne
Shell - but i
ossed the line into something that really should be written in a
different language :-)
David Lang
___
Tech mailing list
Tech@lists.lopsa.org
https://lists.lopsa.org/cgi-bin/mailman/listinfo/tech
This list provided by the League of Professional System
It's going to be interesting to see what making Bash and other tools available
on Windows is going to do to scripting there over the next several years.
David Lang
On Thu, 12 May 2016, Ski Kacoroski wrote:
Yves,
I teach a scripting/automation system admin course at a local college. W
complex as they handle
more and more special cases. It's easy to end up with a monster bash script that
really should be something else, because it started small and grew over time.
http://xkcd.com/1667/
David Lang
___
Tech mailing list
Tech@l
thousands of
businesses that all have "just use 10.x.x.x" as their policy.
that's where things get ugly and using publicly allocated addresses for internal
stuff is attractive because it already de-dups the ranges.
David Lang
_
On Sat, 10 Oct 2015, Edward Ned Harvey (lopser) wrote:
From: David Lang [mailto:da...@lang.hm]
The think you seem to be missing is that in most cases, bad actor insiders can
do so much damage to you that getting your password is probably the least
dangerous thing that can happen to you.
I am
ate a
site-specific password to send to the site. Browser plugins hve been available
to do this for a long time.
David Lang
___
Tech mailing list
Tech@lists.lopsa.org
https://lists.lopsa.org/cgi-bin/mailman/listinfo/tech
This list provided by the Leag
r still has your password.
I'm not saying that there is no value, but your message is very misleading.
David Lang
___
Tech mailing list
Tech@lists.lopsa.org
https://lists.lopsa.org/cgi-bin/mailman/listinfo/tech
This list provided by the League o
ntext, the point is that applications usually log internal problems,
and when they do, it's far more accurate to react to the log messages than to
try and detect the same problem by the application response behavior.
David Lang
my sec config: It sends an alert when something stops loggin
blems that aren't logged (which is why I think you should
log how long it took to service the request), so you need the external test as
well. But there is a LOT of stuff the extenal test won't detect.
David Lang
As far as false positives go the same is true for the failed attempt. This is
On Sun, 23 Aug 2015, Hans van der Made wrote:
Yes, you should still be looking at your logs, but I believe that what's
more critical is that you monitor the service *from the user's point of
view*, and that monitoring should reflect the users' experiences as
closely as possible. If you do tha
edings/lisa2000/full_papers/brutlag/brutlag_html/index.html
David Lang
On Sat, 22 Aug 2015, Graham Dunn wrote:
The Linux logwatch package operates on a "these patterns are okay, these
patterns are bad, anything else is unmatched, here's those ones" basis.
There are many modules for
7;s machines
are much less protected?) if it's malware protection, you need to be much more
reluctant to let anyone unblock their own request.
David Lang
On Saturday, August 22, 2015, David Lang wrote:
What are you looking for as being 'timely'? I've seen that term a
e, or from all offices, etc)
Have all review questions and implementation times update the ticket so that the
requester can see what's happening and isn't trying to call you to ask. Make the
implementation process update the ticket and notify the requester so that you
don't spen
On Fri, 21 Aug 2015, john boris wrote:
Here at $WORK we have a distributed Web Filtering system. We have just
started looking to streamline the process. I figured that other large
school districts have done this already or attempted it so I will ask here.
We have 18 High Schools and 140 Element
On Fri, 21 Aug 2015, Edward Ned Harvey (lopser) wrote:
I want to know if a web server gets overrun by too much traffic requests. I
certainly know how to monitor memory, and tweak the MPM and stuff in apache
config files, but I assume if it runs out of threads or memory or anything, it
will thr
As I see it, you either trust your distro, or you pay one of the vulnerability
scanner companies to track such things (and deal with the errors that happen
anyway)
And then you keep an ear out for critical things that haven't made it to the
updates yet anyway.
David Lang
On Tue, 1
ovides csv-aware versions of grep/cut/sort and
conversion tools.
David Lang
I might end up just grepping the data I need out of the flat file. All I'm
looking for is CVE ID, Summary and CVSS score. Has anybody been down this
path already?
_
a few
sysadmins and devs)... Is this bash vs other shells? I feel weird not knowing
this.
I don't think it's new or bash only, I've seen it in some quite old stuff.
There are always new tricks to learn, no matter how long you've been at this
stuff.
David Lang
__
o there are some devices supported by
DD-WRT than aren't supported by OpenWRT, so if you like DD-WRT take a look at
it's compatibility info.
David Lang
On Fri, 23 Jan 2015, Frank Bulk wrote:
I'd like to point out the new Linksys WRT1200AC, introduced at CES. Seems
to have all
On Thu, 22 Jan 2015, Matt Lawrence wrote:
So, once I managed to get postfix and dovecot dealing with my Maildir inbox
correctly, I moved on to the MUA step. Alpine did very strange things, so I
dropped it immediately.
what problems did you run into with Alpine?
David Lang
the meantime.
David Lang
___
Tech mailing list
Tech@lists.lopsa.org
https://lists.lopsa.org/cgi-bin/mailman/listinfo/tech
This list provided by the League of Professional System Administrators
http://lopsa.org/
On Sun, 11 Jan 2015, John Sellens wrote:
On Sun, 2015/01/11 10:50:53PM -0500, Brandon Allbery
wrote:
| Definitely overkill. I used to do that; my excuse is that it was my testbed
| for a departmental upgrade. For small setups, dovecot makes more sense.
| Alpine is still the tool for migration
ox mail file, or a IMAP server
on a local or remote machine), then delete the messages that you copied. That
will buy you time to finish setting things up and you can then copy the
remainder.
David Lang
___
Tech mailing list
Tech@lists.lopsa.org
http
On Sun, 11 Jan 2015, Matt Lawrence wrote:
On Sun, 11 Jan 2015, Brandon Allbery wrote:
Definitely overkill. I used to do that; my excuse is that it was my testbed
for a departmental upgrade. For small setups, dovecot makes more sense.
Alpine is still the tool for migration from Pine to IMAP, th
f delivering it to local mailboxes. It's probably a one-line
config change or so in Postfix to redirect the mail.
David Lang
https://cyrusimap.org/
some quick google results that look useful.
http://wiki.centos.org/HowTos/Postfix+CyrusImapd+SASL
http://www.tldp.org/HOWTO/Postfix-Cyrus-Web-
Linux system as your Internet firewall
(could be a full PC based system, or it could be something like an openwrt
router)
Is anyone on the list in such a situation and interested in helping out?
David Lang
___
Tech mailing list
Tech@lists.lopsa.org
ing up or overheated, but freezing the
drives and giving them a sharp twist by hand at power up to get the platter
moving solved these problems long enough to get the data copied off of them.
David Lang
On Fri,
5 Dec 2014, Andrew Hume wrote:
i have no experience with hard drives being st
riodically try and access them. If you fail to access one, then copy another
to new media.
David Lang
___
Tech mailing list
Tech@lists.lopsa.org
https://lists.lopsa.org/cgi-bin/mailman/listinfo/tech
This list provided by the League of Professional System Administrators
http://lopsa.org/
You also don't know if the records were tampered with. The fact that they were
able to encrypt them shows that they had the capability to tamper with them.
It's not a likely attack (too much money to be made with the simple approach),
but it's possible.
David Lang
On T
On Tue, 16 Sep 2014, Dave Close wrote:
David Lang wrote:
While HIPPA or PCI are clear triggers that can point at the need to have a
Professional Sysadmin in charge, defining the terms this way makes it easy to
say that the local Deli probably doesn't need a professional running
at can be specialities, I think
there is still room for the generalist in our field
David Lang
Hans
On Wed, Sep 17, 2014 at 2:13 AM, David Lang wrote:
On Tue, 16 Sep 2014, Paul Heinlein wrote:
On Tue, 16 Sep 2014, David Lang wrote:
I agree, but I was more asking for thoughts on if this
h a
capital P), almost all of them do end up involving a lot of one-on-one work.
Even if a large Law or Engineering firm, it's still one-on-one for most work.
David Lang
-Adam
On Tue, Sep 16, 2014 at 6:22 PM, Miles Fidelman
wrote:
Brandon Allbery wrote:
On Tue, Sep 16, 2014 at 5:
ring the point (and maybe being just a bit snarky
- it's been that kind of a day.).
It's been an "interesting" day for me as well.
But seriously, returning to the discussion in progress - see comments below:
--
On Tue, 16 Sep 2014, Paul Heinlein wrote:
On Tue, 16 Sep
On Tue, 16 Sep 2014, Miles Fidelman wrote:
David Lang wrote:
From a discussion on what makes a "Professional" writer, but I think the
definition is a good one.
?professional? means 1) someone whose work can determine his client?s life
and/or liberty, and 2) who usually deals with
On Tue, 16 Sep 2014, Paul Heinlein wrote:
On Tue, 16 Sep 2014, David Lang wrote:
I agree, but I was more asking for thoughts on if this was a good
defintiion of "Professional" and if this definition would work any better
than the previous definitions we've tries to u
On Tue, 16 Sep 2014, Paul Heinlein wrote:
On Tue, 16 Sep 2014, David Lang wrote:
Our work sure qualifies under the first point, and while large shops have
checks in place, Snowden has shown that even the NSA can't prevent a rouge
Sysadmin from doing series damage, and is no different t
On Tue, 16 Sep 2014, Brandon Allbery wrote:
On Tue, Sep 16, 2014 at 4:31 PM, David Lang wrote:
I would probably add to #1 "or end up costing a very large amount of
money" defined as a large multiplier of what the client is paying for your
service.
I would argue that in many, pe
From a discussion on what makes a "Professional" writer, but I think the
definition is a good one.
“professional” means 1) someone whose work can determine his client’s life
and/or liberty, and 2) who usually deals with clients on a one-on-one basis,
where the client is unlikely to be able to
On Fri, 12 Sep 2014, David Nolan wrote:
On Friday, September 12, 2014, David Lang wrote:
In general, I dislike the methodology of writing data to disk for another
file to scrape and do something with. There are just so many things that
can go wrong
It depends on your requirements for
On Fri, 12 Sep 2014, David Lang wrote:
On Thu, 11 Sep 2014, Yves Dorfsman wrote:
On 2014-09-10 22:26, David Lang wrote:
How many different logs are you talking about?
It depends on the server, apps server can have a dozen logs + the regular
system logs.
Do you have another method of
On Thu, 11 Sep 2014, Yves Dorfsman wrote:
On 2014-09-10 22:26, David Lang wrote:
How many different logs are you talking about?
It depends on the server, apps server can have a dozen logs + the regular
system logs.
Do you have another method of getting the logs other than scraping the
The Transcend wifi cards are also hackable, I've got a couple of 32G ones in my
pocket that I have the hacked image on so I can just SSH into the card (they run
Linux)
David Lang
On Sat, 6 Sep 2014, Lawrence K. Chen, P.Eng. wrote:
Yes, my first thought was get an Eye-Fi card that
-line log
messages, etc)
Do the files rotate by date, or with the 'standard' approach of mv the old file
and re-open it?
David Lang
On Wed, 10 Sep 2014, David Lang wrote:
Yes, you will need to HUP rsyslog if you replace the file it's reading.
what does graylog2 do with it
Yes, you will need to HUP rsyslog if you replace the file it's reading.
what does graylog2 do with it's logs today? is there any option other than just
writing to a file?
David Lang
On Wed, 10 Sep 2014, Nathan Hruby wrote:
We used rsyslog with the imfile option to hoover in
ctures (at fairly low 2mp or
so resolution), or even control the camera (great for long exposure shots)
HD video is only 2mp, so if you are getting things from a video camera you don't
have a lot of data to pass to just get a single image
If you are wanting to view video, that changes
It depends on the camera, and also what resolution you are looking for.
David Lang
On Thu, 4 Sep 2014, john boris wrote:
Outside of work i coach high school football. We are now allowed to use
cameras,tablets and laptops on the sidelines. I am trying to figure out how
to share photos from the
On Fri, 16 May 2014, Matthew Barr wrote:
On Fri, 16 May 2014, Edward Ned Harvey (lopser) wrote:
Have you looked into who's behind creating DMARC? AOL, Google,
Microsoft, Yahoo, Facebook, Comcast, and others.
Something to consider is that it was *also* created by Paypal & banks, which
are f
On Fri, 16 May 2014, Shrdlu wrote:
On 5/16/2014 6:13 AM, David Bronder wrote:
On 05/16/2014 08:01 AM, Edward Ned Harvey (lopser) wrote:
From: David Lang [mailto:da...@lang.hm]
Well, you are making quite an assumption when you say that what
they are doing is correct and that the only way to
On Fri, 16 May 2014, Edward Ned Harvey (lopser) wrote:
From: David Lang [mailto:da...@lang.hm]
Well, you are making quite an assumption when you say that what they are
doing
is correct and that the only way to do anything going forward is to munge
things
to work with Yahoo
As I said in OP
oviders insist on two contradictory
things?
This is listed as an "experiment" on the part of Yahoo. Well, the experiment is
showing that this is a bad thing to do.
If they want to quaranteen mail that doesn't pass DMARC and then run other tests
against it, that&
think there's anything new
here, but it may be presented in ways that get people to think. (and we don't
have the political views problem that SFWA has)
http://thewriterinblack.blogspot.com/2014/03/what-i-want-in-writers-organization.html
David Lang
_
my issue with c-a-d was with a console shared between windows an linux, on
windows you hit c-a-d to get a login screen, on linux (default installs) it
rebooted.
disabling c-a-d being the reboot in linux solved my problem (I still had sysreq
if needed
David Lang
On Tue, 13 May 2014, Mathew
communications
the other possibility would be if someone could have learned enough from a
webserver to login to your system (someone using the same password for a web
page as for ssh access where you allow password authentication for ssh as an
example)
David Lang
___
On Wed, 30 Apr 2014, Edward Ned Harvey (lopser) wrote:
From: David Lang [mailto:da...@lang.hm]
but what if they use different certs for the different servers?
Like I said. Match the pattern. So if you have a server with cert "foo.example.com,example.com" and another
server
On Wed, 30 Apr 2014, Edward Ned Harvey (lopser) wrote:
From: David Lang [mailto:da...@lang.hm]
This is where I disagree. With heartbleed, any single site could be
compromised
just as easily, the only difference is that the password they got would not get
them into any other site.
You are
On Wed, 30 Apr 2014, Edward Ned Harvey (lopser) wrote:
From: David Lang [mailto:da...@lang.hm]
It's not just that, it's the case where a company has multiple resources for
you
to access (forums, support, mail) that legitimately live on different servers
but share an identity.
Get a
sed, it doesn't protect you any longer. But it *should* reduce the
incidence of passwords being compromised. I can name a few preventable recent
high profile cases (nevermind low profile incidences that we didn't hear about
in the news).
I don't see how it prevents your passwords from
;s a bit hard to
just believe their denials.
On the other hand, bloomberg isn't the most reliable of sources either.
but as you say, that really doesn't affect the tactical "what do I need to do
now" question.
David Lang
P.S. for what little it's worth, I think th
On Tue, 8 Apr 2014, David Blank-Edelman wrote:
On Apr 8, 2014, at 9:48 AM, Paul Graydon wrote:
There is ample proof this morning that it can be used to acquire yahoo
credentials with ease as Yahoo remains unpatched.
So I’ve seen the screen shot too that went around, but I have to admit, I’m
have you tried disconnecting and reconnecting the wire? sometimes this will
clear the problem (or at least generate something in the logs to help you figure
it out)
David Lang
On Thu, 6 Feb 2014, john boris wrote:
Date: Thu, 6 Feb 2014 16:04:08 -0500
From: john boris
To: Robert Lanning
Cc
y are large (or
worse growing) it may matter.
David Lang
___
Tech mailing list
Tech@lists.lopsa.org
https://lists.lopsa.org/cgi-bin/mailman/listinfo/tech
This list provided by the League of Professional System Administrators
http://lopsa.org/
break it down into the individual things that need to happen, most of them are
fairly trivial. The only really hard thing is the idea of merging their updates
into a new base image, and that probably isn't needed for a 7 year old, but will
be desirable later on, so you have a few years to f
peforming RAID cards that were safe. And software raid can
perform well, but is not as safe.
David Lang
On Sun, 17 Nov 2013, Atom Powers wrote:
Let me clarify:
In my experience software RAID is more stable than /on board/ hardware
RAID. An expensive RAID controller with batter backup will,
The problem with software RAID is that if you loose power in the middle of a
write, you may end up with some drives updated and others not.
With battery-backed hardware RAID. the controller knows this and finishes the
write when power returns (assuming the battery doesn't die first)
The other thing I would look for is I/O spikes, try running iostat for a bit and
see if you have a disk getting hammered. If so you can tweak kernel settings to
not let as much data get cached before it starts getting written out.
David Lang
On Tue, 12 Nov 2013, Leon Towns-von Stauber wrote
ould be
something to at least try (you may find it doesn't work for you, but you will at
least have a baseline to compare everything else against)
Once updatedb has done it's scan, I don't know what other overhead you would run
into when using it (u
I'll second this, SEC is very powerful, and the powerful features are complex to
setup, but if you are just doing simple things, it's not that hard to setup.
I have an introduction to SEC article that is going to print in the December
;login:, I'll send a copy of the article to James to hopeful
blem is going to be recovering applications, especially
applications that don't implement proper data safety with f*sync() calls. And
given that ext3 had pathalogically bad behavior with f*sync(), most app
developers aren't going to use them.
David Lang
__
the VM tools do this.
increasing the timeouts can cause problems as well, if the SAN gets slow it may
not cause your system to loose the disk, but if you have multiple disks on your
system, one of them failing can result in the system getting VERY slow as things
timeout repeatedl
On Mon, 21 Oct 2013, unix_fan wrote:
Problem:
We are supposed to run an AV solution, where available for the OS we run.
The Enterprise choice we run on Windows - the vendor sort of rhymes with
"gigantic" - is "suboptimal" ... on Linux. It doesn't work for recent
kernels and they haven't
On Sat, 14 Sep 2013, Adam Levin wrote:
The other system we saw recently is called Amplidata. They have a file
system (if it can really be called that) that provides so much protection
via erasure coding that you no longer need to back up the data because the
calculated protection is three order
chine off before you stop running out
of RAM, but this then shows you at 80% CPU, you are running out of CPU as well.
David Lang
On Friday, August 23, 2013, David Lang wrote:
On Fri, 23 Aug 2013, john boris wrote:
Okay I am doing this from my iPhone so I am trying to answer everything
1. I
uld get it on your new server.
David Lang
___
Tech mailing list
Tech@lists.lopsa.org
https://lists.lopsa.org/cgi-bin/mailman/listinfo/tech
This list provided by the League of Professional System Administrators
http:/
On Fri, 23 Aug 2013, john boris wrote:
Here at $work they have decide to get one server to handle 17+ of my
current servers. I am doing this right now with two HP DL-160 G5. Stupid HP
has some weird Memory configurations. Anyway those two HPs sound like Jet
engines although they are in our NOC I
, left and right):
$ xrandr --output --set TOP 20
Changing 20, until you get it right.
David Lang
On Thu, 22 Aug 2013, john boris wrote:
Date: Thu, 22 Aug 2013 21:01:53 -0400
From: john boris
To: David Lang
Cc: Craig Cook ,
"tech@lists.lopsa.org"
Subject: Re: Lookin
this, but
with my TV at home, I don't.
David Lang
On Fri, 16 Aug 2013, john boris wrote:
Date: Fri, 16 Aug 2013 13:07:08 -0400
From: john boris
To: Craig Cook
Cc: "tech@lists.lopsa.org"
Subject: Re: [lopsa-tech] Looking for help with xubuntu
When the system comes up I get the
I don't think they have performance per page, but they do have memory
utilization, mostly by page, see about:memory
David Lang
On Mon, 19 Aug 2013, Tom Throckmorton wrote:
I don't believe there is such an addon, but about:memory might provide you
some clues. Do 'measure'
steal the password,
none of this matters.
David Lang
___
Tech mailing list
Tech@lists.lopsa.org
https://lists.lopsa.org/cgi-bin/mailman/listinfo/tech
This list provided by the League of Professional System Administrators
http://lopsa.org/
tendancy is to just ignore alerts that happen during the
patching window)
David Lang
On Tue, 28 May 2013, Francis Liu wrote:
That's the most useful explanation of "why one might choose to have TPM"
I've ever read.
On Mon, May 27, 2013 at 11:35 PM, Edward Ned Harvey (lopse
On Wed, 22 May 2013, Steven Kurylo wrote:
How are you encrypting your server's disks, when they contain sensitive
information?
Are you doing full disk?
With auto boot? Or do you use Mandos, or similar? Or enter the password
manually for each machine?
Or are you not bothering with encryption,
nt to know when a set of changes to different files are related. And the
ability to pull the history to a different system is quite handy.
David Lang
___
Tech mailing list
Tech@lists.lopsa.org
https://lists.lopsa.org/cgi-bin/mailman/listinfo/tech
This list pro
automated checkins a different comment
so it's obvious which is which. It avoids a user checking something in that
includes a bunch of stuff that other people changed.
David Lang
___
Tech mailing list
Tech@lists.lopsa.org
https://lists.lopsa.org/cgi-
two, or edit the file yourself.
but if the .deb package doesn't define the conffiles correctly, you have
problems
I don't know what rpm provides that would be similar.
David Lang
___
Tech mailing list
Tech@lists.lopsa.org
https://lists.lops
omission may be noteworthy in some instances.
actually, git doesn't track permissions (other than the x bit), but it has hooks
to allow plugins to deal with this and etckeeper adds this permission managemnt
on top of the content management that git pr
On Sun, 7 Apr 2013, Robert Hajime Lanning wrote:
On 04/07/13 04:15, David Lang wrote:
also, as you move from one zone to another, all your connections will
drop as the new router won't have them in it's masquerade tables.
Yes, that would be true. I spaced on the NAT state table, t
On Sun, 7 Apr 2013, Edward Ned Harvey (lopser) wrote:
Date: Sun, 7 Apr 2013 12:03:24 +
From: "Edward Ned Harvey (lopser)"
To: David Lang , Frank Bulk
Cc: "tech@lists.lopsa.org"
Subject: RE: [lopsa-tech] Wifi
From: tech-boun...@lists.lopsa.org [mailto:tech-boun...
On Sun, 7 Apr 2013, Robert Hajime Lanning wrote:
Date: Sun, 07 Apr 2013 04:03:52 -0700
From: Robert Hajime Lanning
To: LOPSA Tech
Subject: Re: [lopsa-tech] how to do multi-zone WiFi with stock Linux?? was Re:
Wifi
On 04/07/13 02:34, David Lang wrote:
So, I had a couple of hours of solo
are mostly marketing with a dose of management tools.
As SCALE continues to grow, I also need to try and anticipate future problems by
thinking through them because I don't have any time to experiment (setup on
Thursday, users arrive on Friday, teardown for the year on Sunday)
David Lang
On Sat, 6 Apr 2013, David Lang wrote:
On Sat, 6 Apr 2013, Matt Simmons wrote:
how large do you need to be fore this to break? I've done this at
conferences with over 2000 people, 40 APs across a large hotel. >There were
no signs of problems. I'm interested to learn what problem
duh, that's right, 802.11x and 802.1x I wasn't remembering them.
David Lang
On Sat, 6 Apr 2013, Frank Bulk wrote:
Because the Wi-Fi authentication happens *before* the IP address is handed
out.
Frank
-Original Message-----
From: David Lang [mailto:da...@lang.hm]
Sent: Saturday
er of associated mobile devices /to any one AP/.
Yes, and if you have people doing high bandwidth things over wireless (streaming
video, OS upgrades/installs, etc), this can end up being important even with a
relative handful of people.
As you say, the best thing is to get them to use 5GHz
David
1 - 100 of 118 matches
Mail list logo