[07:09] <rougeleaf> Good morning, where can I get some network assistance? Please
[07:12] <nhaines> rougeleaf: what kind of assistance?
[07:13] <rougeleaf> For a network bridge
[07:21] <nhaines> You mean how to set up a computer to act as a bridge?
[07:29] <rougeleaf> To bridge my wireless to my lan. I receive Internet via wireless, need to connect a non wireless device
[07:30] <rougeleaf> I have done this many times in windows. I have been unsuccessful in linux.
[07:31] <rww> !ics
[07:31] <rww> Try #ubuntu if that doesn't work out.
[07:33] <jussi> jpds: ubot2 is missing...
[07:33] <rww> the bots are escaping :O
[07:57] <rougeleaf> ubottu your links helped greatly, thank you
[07:57] <rougeleaf> humm
[07:58] <rougeleaf> ...Thanks for the support
[07:58] <jussi> rougeleaf: rww called the bot for you :)
[07:58] <rougeleaf> Not sure what that means
[07:59] <jussi> !bot | rougeleaf
[07:59] <jussi> see, I did that.
[07:59] <jussi> rww:  did the one that you appreciated
[07:59] <rww> jussi confuses new people!
[07:59] <rougeleaf> lol indeed
[07:59] <jussi> always :D
[08:00] <rougeleaf> I get the idea, just the how part eludes me
[08:00] <rww> rougeleaf: of internet connection sharing or bot usage?
[08:00] <rougeleaf> As a friend said to me once, jack of all trades, master of none
[08:01] <rougeleaf> The bot usage
[08:02] <rougeleaf> ... The link via rww provided by the bot solved the answer I was looking for
[08:02] <rww> rougeleaf: If you write a message beginning with "!" or "ubottu" (e.g. "!ics"), ubottu looks in its database, finds the "ics" entry, and then outputs it to the channel.
[08:03] <rougeleaf> ! wireshark
[08:03] <rww> without a space ;). but it doesn't know about wireshark anyway, so... :(
[08:03] <rougeleaf> lol ok
[08:03] <rougeleaf> !lol
[08:04] <rww> http://ubottu.com/factoids.cgi has a list of all of them, or you can PM ubottu too.
[08:04] <rougeleaf> Thank you for the bit of info, first time I have learned thus
[08:04] <rougeleaf> this*
[08:04] <rww> http://ubottu.com/devel/wiki/Plugins#Encyclopedia has entirely more information about bot commands than you'll ever want to know :)
[08:04] <rougeleaf> Thank you much for the info
[08:05] <rougeleaf> I greatly appreciate it
[20:26] <guntbert> LjL: are you around?
[20:36] <LjL> guntbert: yes
[20:37] <guntbert> LjL: about the floodbots questions in #ubuntu-unregged - I have a little concern - are you the person to talk to?
[20:39] <LjL> guntbert: most likely
[20:41] <guntbert> LjL: I tried it - it worked - the question/answers are nice - but: everybody can stay in the channel as long they desire - so it seems pretty easy to feed the questions/answers into a database
[20:42] <LjL> guntbert: yes it's true. i'm not really sure how to work around that. however, i'd keep a couple of things in mind: 1) you don't ever see the answers, so you'd still have to input those manually into the database 2) is it really any easier than registering bogus email address somewhere that lets you, and then registering your bots' nicknames using those?
[20:48] <guntbert> LjL: good point  --- and I just found out that the two possible workarounds I "found" had serious flaws  (one would be to kickban every user after some time, the other wouldn't work at all so I won't mention it :-))
[20:48] <rww> Every defense system has problems. The goal is to have problems that the other side has not yet managed/bothered to exploit ;)
[20:51] <LjL> guntbert, rww: even if you kickban after a timeout, it's easy enough for the attacker to join multiple nicknames. they have proxies, very many of them. the only real fix i can think of would be to go back to the original idea of captchas, and implement them properly (i.e. not the way i had in mind), which would be annoying because of the way the bots work, and make it more complicated for users to join
[20:51] <LjL> for now i say we cross our fingers and hope it's not worth it for the attackers to crack this
[20:51] <rww> indeed
[20:51] <LjL> although they already did try
[20:52] <LjL> earlier on today, they joined a lot of clones from one ip address, which no apparent intent but to get questions asked
[20:52] <rww> hah
[20:52] <Pici> It was a lot of clones.
[20:52] <rww> how long ago?
[20:52] <Pici> I daresay hundreds.
[20:52] <LjL> yes
[20:53] <LjL> my client (which admittedly is sort of prone to hanging up)
[20:53] <rww> ah, nvm, found it
[20:53] <LjL> well, it hung up
[20:53] <Pici> 7 hours.
[20:54] <LjL> anyway i'll see if i can manage to have a backup method (i.e. captchas) ready in case this is cracked
[20:54] <guntbert> what about PMing the questions? that wouldn't beat the clones but idling would not give them more info
[20:55] <LjL> does anyone have experience with captchas and could either point me to some generator that can generate hundreds of them for me (and their solutions), or suggest another method that can work when the server is not the machine the bots are running on?
[20:55] <LjL> guntbert: yeah i thought of that, but i think it might easily confuse people (i already have to deal with people *answering* in PM, god only knows why they do that), for not much of a gain since as you say clones can still join
[20:56] <LjL> guntbert: anyway it would be very easy to change the bots to work from PM if the attackers attack
[20:56] <guntbert> LjL: ack
[20:57] <LjL> also, it really doesn't even take looking at all the questions to manage to get clones past the check
[20:57] <LjL> go and guess why that is :P
[21:14] <guntbert> LjL: as for the captchas problem: I suggest (after finding an acceptable generator :-)) to generate the secret string on the bots machine, send it to a (yet to find) online generator from which you'd get an url which you present to the user - so the checking would be really easy
[21:20] <LjL> guntbert: sending it to the generator would pose a few problems. the bots aren't multithreaded, so making a connection to the internet is really not something they should do if they don't want to hang up
[21:21] <guntbert> LjL: I see - I obviously didn't think far enough :-)
[21:22] <LjL> guntbert: well you couldn't have known there was no multithreading. what i had originally in mind was, basically, have a static site containing 200 jpegs, named by number; have the bots contain a list of all 200 numbers and their solutions; give the user a random one (actually it's not random, and that is related to what i asked above :P), and if after looking at it they can provide the solution, it's done
[21:23] <LjL> guntbert: the captchas are still a limited number (like 200), but if they can be automatically generated, that number can be made arbitrarily large (contrary to hand-crafted questions)
[21:23] <guntbert> LjL: as an aside: there was just the question "how much is 6 and 2 (7+2)"
[21:23] <LjL> guntbert: yeah i saw it. it'll be fixed in one minute when the bot updates
[21:27] <guntbert> LjL: your idea seems sensible -- I'll be looking for a part of this solution - not sure which part :-) but I'll start with looking into the image generation
[21:28] <LjL> guntbert: that's really the thing i need solved, the rest is just a little simple bot coding. somehow, i found a few places that will either *produce and check* captchas for you (like google's recaptchas), but not give you the solution so that you can use them on a static site; or generators that can give you one captchas, but can't really be used in batch mode
[21:29] <LjL> note that i'd still stick to the current questions if at all possible
[21:29] <LjL> a captcha image may seem simple enough, but it isn't really
[21:29] <LjL> it doesn't work if you don't have a graphical browser (which is often the case if you're stuck with a broken install)
[21:29] <LjL> and it doesn't work if you're blind
[21:31] <guntbert> LjL: I like the current questions better too - but I'll try to find a batch-captchas-generator just in case
[21:32] <LjL> thanks
[21:56] <lefantomedurezo> Hello, what is the international chan ubuntu for offtopic?
[21:57] <k1l> lefantomedurezo:  #ubuntu-offtopic