Hi!
> > > today, since i woke up "internet was not working" at stein712
[...]
> I have exactly the same problem... :-)
[...]
> Maybe someone could have a look at the issue?
I am online again; thanks to whoever fixed that!
-- Adi
signature.asc
Description: Digital signature
--
Wien mailing list
sogar mit youtube HD live stream:
https://www.youtube.com/watch?v=Exg1wRMvRj0
On 20.04.18 16:51, Paul Fuxjaeger wrote:
> hallo Leute,
>
> letzte Woche gab es bei der Termin-Koordination ein kleines
> Missverständnis. Sorry dafür von mir und Christian, danke an Clemens
> fürs Einspringen. War ein
Reminder für den Vortrag heute im Metalab und auf Jitsi, Christian hat
zugesagt:
Thema: Soziokratie
https://de.wikipedia.org/wiki/Soziokratie
Vielleicht kann uns dieses Konzept erklären wieso wir in manchen
Situation dazu neigen Strukturen zu zerstören, in der Überzeugung eben
genau diese
On Mon, Apr 23, 2018 at 11:29:43AM +0200, Albert Rafetseder wrote:
>
> The packet traces indeed look like a machine on the path between the
> server and you injects an RST, "Great Firewall" style. If I remember
> correctly, machines used to send an RST by default when seeing a packet
> their
Hi Gui,
thanks for the report, I'll look into it.
public.metalab is actually the backup-router, traffic from the metalab-LAN is
actually NATted over v642 behind 185.194.20.42, do you see any logs for this?
Currently I don't see any traffic on port 22 originating from public.metalab.
BR,
Hi Gui,
The packet traces indeed look like a machine on the path between the
server and you injects an RST, "Great Firewall" style. If I remember
correctly, machines used to send an RST by default when seeing a packet
their stack doesn't expect --- like from a connection they didn't
initiate,
On 23/04/18 11:03, Gui Iribarren wrote:
> yay!! so my report was not useless, happy about that :) (for a moment i was
> afraid it was something unique to me, and my email was just noise to the list)
>
> i'm more than happy to aid debugging. yesterday i tried to "bisect" the
> traceroute hops to
yesterday while debugging the RST thing, i also spotted a flood of these
in the log. circa 17 attemps per minute, lasted for at least a couple of
hours. here two example lines only:
Sun Apr 22 18:42:33 2018 authpriv.warn dropbear[29515]: Bad password
attempt for 'root' from 78.41.112.151:44084
Sun
yay!! so my report was not useless, happy about that :) (for a moment i was
afraid it was something unique to me, and my email was just noise to the list)
i'm more than happy to aid debugging. yesterday i tried to "bisect" the
traceroute hops to see how far i could get without RSTs, but did not
Hi!
> > today, since i woke up "internet was not working" at stein712
> > i just time to take a closer look, and something funny is going on.
> > global ipv6 works as expected.
> > ipv4 icmps also work fine, RTT to various known places is legit
> > but any tcpv4 fails misteriously with a RST
I
10 matches
Mail list logo