Hacker News new | past | comments | ask | show | jobs | submit | pak9rabid's comments login

Isn't this something that explicit transactions (BEGIN/COMMIT/ROLLBACK) do? Many DB clients can be configured to have autocommit disabled, so that you're forced to either COMMIT or ROLLBACK each transaction.


Maintaining a website shows you're a step above the rest of the herd I suppose.


If you don't need routing, you could always use the vastly simpler ATA-over-Ethernet protocol.


Yep. The P5 arch (original Pentium) superscalar design, combined with its much faster FPU and separation of data and code caches meant it could run circles around a 486-based CPU, even if it was running up to twice the speed of a 486 contender.


I had a dual Pentium Pro 166Mhz w/512kb caches running on a Tyan mobo. That thing was fast under Linux.

EDIT: Present day, rocking a thread ripper with 48 logical cores. Still running Linux.


Thanks! It's definitely cool to be able to use my Raspberry Pi (running Kodi with the Moonshine addon) as a "dumb terminal" to stream from my gaming rig from the other side of the house onto my big ass living room TV :).


lol, I used to do this all the time at non-free wifi hotspot locations, only I'd start off with a ping sweep of the entire subnet (nmap -sP) in order to get my ARP cache filled with a bunch of potential usable IP/mac addresses on the network. From there, I'd iterate through each one and set the IP & mac address until I found one that would let me through the firewall.

Granted, being a NOC engineer at Wayport (now AT&T WiFi) certainly helped me understand how it all works.


Yes the key to doing this more seamlessly is to spoof both the IP and the MAC so your machines are not constantly fighting with the other person over the ARP table entry.


Aren't you then fighting the switch's port learning? Or RSTing each other's TCP connections?


Its wifi. You both just pick up the same frame when it is broadcast, then it sees two stations (a level below IP) with the same MAC. Most routers just don't care about that. (it's technically a valid edge case that two stations have the same mac address. It should be vanishingly rare in the wild ... but this is a practical example of why it isn't).


"vanishingly rare"

I once bought a cheap Bluetooth dongle from China. Its MAC address was 11:11:11:11:11:11 Obviously there are now a lot of bluetooth dongles in the wild with the same MAC address.


I still see a lot of "(to be filled by OEM)" on computer parts

at least they bothered to type something!


If there's multiple hotspots behind the same controller, you may well get switch port fighting.


If STP[1] is enabled, but that is unlikely since you'd have dropped connections when roaming for the reasons you just gave. Most likely, STP is not enabled on these networks.

[1]: https://en.wikipedia.org/wiki/Spanning_Tree_Protocol


A switched port learns the Mac address for packets sent into it. If port 1 sends a packet with Mac a, the switch associates that address (a) to port 1. When another node sends a packet onto another port with the same mac, say on port 2, the switch will move the learned address a to port 2 and remove it from port 1.

When a switch has learned a mac address all traffic destined to that traffic would be immediately switched to that port. If the switch has no record for that specific mac address it floods all ports except the ingress port. This is expensive and means other devices receive traffic that isn't intended for them so they waste time dropping it.

So in networks that have no protections against those attacks then this could very well be a problem if there are multiple access points and the two nodes are on different access points.


Except that this is a normal thing on wireless networks. A station may roam many times within a few minutes, and due to reflections, may even be in more than one place at a time.


I believe a UE is only ever attached to a single BSSID for a given SSID at a time.


Let me tell you about 2km, directional links and reflections one day, over a beer.


STP detects loops between switches, not MAC addresses moving between them (or between APs).


Yes so that is the hub case (2nd half of my comment) -- clients will RST each others' connections then. Unless you are MAC cloning but not IP cloning.


A computer doesn’t send a RST when it gets an unknown packet…


Yes, it does, that is the purpose of RST [1]:

> As a general rule, reset (RST) is sent whenever a segment arrives that apparently is not intended for the current connection. A reset must not be sent if it is not clear that this is the case. There are three groups of states:

> 1. If the connection does not exist (CLOSED), then a reset is sent in response to any incoming segment except another reset. A SYN segment that does not match an existing connection is rejected by this means.

It's possible for a node to be configured not to do this, but this is the default behavior.

[1] https://www.ietf.org/rfc/rfc9293.html#name-reset-generation


So if two wifi clients have the same MAC and IP, everything works fine for both of them?


"everything works fine" might be overstating a bit, but what happens to packets you weren't expecting when you don't have a connection open for them to go into? They probably get ignored by the network stack.

Worst case scenario, the router/service endpoint sees your connection responses and the other party's strange NACK responses, but I honestly don't know enough about how it works to say "everything works fine"

I'd guess that connectionless protocols will work fine and connected protocols will also work fine. The truth is probably YMMV by protocol, but there is truly no way for the wifi router to detect this is happening or isolate the redundant stations - it's an unencrypted broadcast. The only way this goes sideways is if a connection protocol is engineered to make it go sideways when you try to do that.

I'm pretty sure that any such protocol which succumbs to any unencrypted (or incorrectly keyed) traffic that isn't from the designated counterparty is insecure to begin with. It should be resilient against DoS, so most protocols aren't going to have that vulnerability. Again, I'm guessing, but I'd hope.


I imagine this can only possibly work with unencrypted WiFi.

Still boggles my mind that WiFi clients don't establish an encryption key with the AP and encrypted their traffic even without a shared secret. Yes, that means you can't authenticate the AP, but it would still protect against passive snooping.



Usually doesn't matter... The other person will get frustrated and disconnect and reconnect a few times, and finally give up and read a book...


> The other person will get frustrated and disconnect and reconnect a few times, and finally give up and read a book...

That makes me really reconsider my past struggles with this form of Internet access.


Time to consider instead: walk through the plane, look angrily at the other passengers, one at a time, asking: "Do you use 192.168.x.y?". That can solve the problem


Or convince the flight attendants to including “MAC address spoofing” in the spiel about destroying or tampering with lavatory smoke detectors.


Presumably there is a way to find out which other wireless client is impersonating another in a confined environment like an airplane.

A multicast packet might vary based on physical distance to the imposter?


Yeah...


I typically just praise with upvotes, but I’m feeling grateful today: anecdotes like this one and gp are why I love hn


If any lawyers or FAA employees are reading this I’m genuinely interested in what, if any, legal implications there would be for running nmap mid flight on an airline. Surely once you have spoofed the MAC address and IP of another passenger to gain unauthorized access to the planes LAN you have committed a crime but what about passively scanning?


nmap is not a "passive scan". You might be thinking of packet capture?


are you asking if its a crime to read information they've publicly broadcast?

Because if that's a crime we're screwed because then it's illegal to read, or listen.


We should not be surprised how much ignorance there is around this. Networking even for technical people can be a "black art".

https://www.theverge.com/2021/12/31/22861188/missouri-govern...


I wrote this script to do exactly that a while back :)

https://github.com/aselvan/scripts/blob/master/macos/free_wi...


Normally ping is disabled on those networks?


Yup. And we normally have client L2 Isolation.


Am I the only one who is too chicken to commit computer crimes for very low payoff.


Recommended any blog posts?


Heh, I remember a group of us doing that as well. Also "penny drops" off the monkey bars, where you'd hang upside-down with your legs, swing back and forth, release and essentially do a flip and land on your feet. God we were fearless back in the day.


> God we were fearless back in the day.

I have a rule on myself to stay young. Every time I see a swing rope into water I must do a back flip, and every time I see a 1m diving board, I must do a gainer (run forward, back flip).

I'm 41 now, I'm really curious how old I'll be when I can't do them anymore.


We always say “a backie a day keeps the doctor away”.

It’s entirely incorrect but it keeps life fun!


We called those "baby drops", and flipping back off the swing seat as it comes forward we called "cherry pickers". I'm 46 now, I can still do both. Once you've learned them, they're easy.


can and do are two different things. things heal a lot faster when the landings are wrong in playground days than they do at 46. i have personal experience with the healing slower bit if not from a cherry picker move.


At 50 I strained my shoulder doing just a few simple push-ups, and it took nearly a year for the pain to (mostly) go away. Getting old sucks.


I tore a rotator cuff when convinced that riding a long board down the street while not in a sober state would be easy. Going downhill of not an impressive hill, and the speed wobble on a board I had been on for 3 minutes suggested time to bail. I didn't roll nearly as well as a younger me would have. Nearly a year sounds about right.


Yeah, You're way off your game when you're drunk. I learned that lesson the hard way a few times over in my early 20s (though not so hard that I needed a trip to the hospital).


Skateboards are a mortal enemy of vertebrae


As somebody who's gone from: RedHat 5/6 -> Slackware -> Gentoo -> Debian -> Ubuntu -> Debian. Debian (and it's derivatives) is the best of breed and will always be my distro of choice. Great job yall!


I have almost the same way: Redhat 5 -> Mandrake -> Gentoo -> FreeBSD -> Slackware, and finally Debian Etch in April 2007. I've been using Debian for the latest 16 years and am very happy with it.


You need to be more specific with Red Hat :). I'm guessing you meant like "GNOME 1.2" era Red Hat that came on a CheapBytes CD.


My first distro was Red Hat 5 as well. It is disambigous, it was called "Red Hat Linux version 5". Red Hat Linux went to version 9 I believe before it split into RHEL (Red Hat Enterprise Linux) and Fedora.


How is this Debian's fault? You're free to choose whatever desktop environment you want.


I'm supposed to make a choice? To understand something and then decide for myself? Wtf? This must be some new millennials shit, they want to ruin our society :(


You joke, but making the choice for you is one of the things Apple users often consider a value-add from the platform.


Hmm, is AR's Migration framework not a migration manager?


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: