[00:13] <jrwren> Havenstance_: yes, looks like it.
[00:13] <Havenstance_> jrwren, that was a virtual machine running it. I just shut it off.
[00:14] <jrwren> Havenstance_: bummer that you had to reboot. I went from 4TB to 12TB (adding 2 - 4TB drives) without a reboot
[00:15] <Havenstance_> jrwren, I rebooted cuz the mobo was too old to support hot swap :)
[00:15] <Havenstance_> at home I use a bunch of old stuff that i've thrown together
[00:25] <mrgoodcat> Havenstance_: if you want to check if you are vuln to the heartbleed to `openssl version -a` and check your build date
[00:25] <mrgoodcat> should be built in the last 2 days
[00:34] <Havenstance_> okay
[00:34] <Havenstance_> yeah those in #xubuntu were rather rude and unhelpful about it
[00:35] <Havenstance_> mon apr 7 :) should be good, ty man
[00:43] <cmaloney> http://magnatune.com/artists/albums/superdirt-algoriddims
[00:43] <cmaloney> mrgoodcat:
[00:44] <jrwren> Havenstance_: dpkg -p libssl1.0.0
[00:45] <jrwren> the Version field there should be newer than what is listed on this page: http://www.ubuntu.com/usn/usn-2165-1/
[00:45] <Havenstance_> jrwren, thanks for the info man :)
[00:46] <Havenstance_> I just built this install from USB like 2 days ago
[00:46] <Havenstance_> idk if that matters but not really worried about it, i'll be upgrading to 14.04 lts soon as it goes live
[00:47] <mrgoodcat> upgrade tomorrow
[00:47] <mrgoodcat> final beta
[00:47] <mrgoodcat> and the tubes will be faster
[00:54] <jrwren> it matters :)
[00:54] <jrwren> upgrade now. help test the betas.
[00:57] <Havenstance_> sadly enough, this hardware won't run 14.04 yet I tried a daily build the other day
[00:57] <Havenstance_> it died
[01:05] <cmaloney> http://www.lordi.fi/
[01:13] <jrwren> am tip:  echo BYOBU_PYTHON=python >> .byoburc   to prevent byobu from running python -c 'import snack' EVERY time it refreshes status line
[01:22] <cmaloney> jrwren: I stopped using byobu in favor of tmux
[01:38] <cmaloney> https://github.com/paultag/hy
[01:39] <cmaloney> https://github.com/hylang/hy/blob/master/hy/importer.py
[01:47] <jrwren> i use byobu-tmux
[01:48] <jrwren> i am a sucker for status line
[02:13] <cmaloney> mrgoodcat: http://openmetalcast.com
[02:13] <cmaloney> ;)
[06:44] <greg-g> holy shit, this wikipedian died this weekend in a climbing accident, this is her last edit: https://en.wikipedia.org/w/index.php?title=Wikipedia:Peer_review/Bringing_Up_Baby/archive2&diff=prev&oldid=601663764
[06:44] <greg-g> so sad.
[10:46] <cmaloney> :(
[10:46] <cmaloney> Always sad to hear someone pass away
[13:13] <Havenstance> is there a list of sites somewhere that were hit by heartbleed?
[13:13] <Havenstance> I keep getting questions on this because our local news channel just picked this up this morning
[13:14] <brousch> All of them
[13:14] <Havenstance> brousch, that's kind of what I was leaning towards.
[13:15] <Havenstance> because even if the site in question doesn't use openSSL that doesn't mean that the DNS Server or something else wouldn't be using it potentially exposing passwords
[13:17] <jrwren> DNS Server or something else?
[13:17] <Havenstance> I know our network server has openssl 1.0.1d or something crazy like that on it.
[13:17] <Havenstance> jrwren, gateways, hosts, datacenters. all the information goes thru them first does it not?
[13:18] <jrwren> umm... yes?
[13:18] <jrwren> well, not "hosts"
[13:18] <jrwren> everything is a "host"
[13:18] <Havenstance> or am i understanding this wrong
[13:18] <jrwren> it sounds like you are understanding this wrong.
[13:18] <jrwren> all information definitely does not go to a dns server.
[13:19] <jrwren> this isn't a packet sniffing vulnerability either, so just becuase https traffic traverses a gateway, does not make it inspectable
[13:19] <Havenstance> okay so the purpose of open ssl is you call out thru the DNS Server gateway all that jazz, then establish a secure connection with that site alone
[13:20] <jrwren> "call out thru teh dns server" does nto makes sense.
[13:21] <Havenstance> but if the site you are calling out to is vulnerable then your secure connection is compromised. DNS, Gateway, and anything in between no longer matter after the secure connection is made with the website no?
[13:21] <jrwren> I can't understand what you are saying. You aren't using the common words used to describe network connections and sessions.
[13:22] <Havenstance> I havent even finished my first cup of coffee cut me some slack :D not fully awake yet :)
[13:22] <jrwren> hahah! me too.
[13:23] <Havenstance> what im asking is when you establish a secure connection, does it still call for DNS Translation after the connection is established? My understanding of OpenSSL is about zero to be honest
[13:24] <jrwren> after? no.
[13:24] <Havenstance> Case in point, My network configuration here, I have the client machines, who route through the server, the server hosts DHCP, DNS, and a VPN Tunnel, Then I route to a router which does essentially the same thing as the server except its DNS calls to my ISP's DNS Server, from there its handed to my ISP and they route the traffic through the closest datacenters and on to the destination
[13:25] <Havenstance> if there's a breach at any point in between isn't there a problem?
[13:25] <jrwren> define "breach"
[13:25] <Havenstance> breach being a heartbleed vulnerability
[13:25] <jrwren> right.
[13:25] <jrwren> then no, no problem.
[13:26] <Havenstance> okay, because my system actually establishes a SSL connection with the destination not the points in between
[13:26] <jrwren> right
[13:26] <Havenstance> perfect, I understood it right, I just couldn't explain it to save my ass this morning lol
[13:26] <Havenstance> btw, list of sites here https://github.com/musalbas/heartbleed-masstest/blob/master/top1000.txt
[13:27] <Havenstance> shows some vulnerable, some not vulnerable and some not using SSL
[13:27] <Havenstance> incase you get bombarded with questions about this over your office coffee pot this morning too
[16:19] <rick_h_> party party here come pycon!
[16:19] <jrwren> yay!
[16:35] <cmaloney> Woo woo
[17:05] <greg-g> https://blog.wikimedia.org/2014/04/10/wikimedias-response-to-the-heartbleed-security-vulnerability/
[17:15] <brousch> http://pyjvm.org/
[17:15] <jrwren> different from jython?
[17:15] <jrwren> OH GOD!
[17:16] <jrwren> brousch: why?!?!   why!!?!?
[17:17] <brousch> I don't know, but I wanted to share the wonder with you all
[17:18] <brousch> jython on pyjvm would be awesome
[17:22] <jrwren> pyjvm on jython on pyjvm
[17:23] <brousch> Can we run pyjvm on pypy?
[17:30] <jrwren> probably
[20:36] <mrgoodcat> hahahahahhaa
[20:36] <mrgoodcat> i wonder what posessed them to make that
[21:10] <jrwren> python + json + performance => terrible terrible terrible
[21:26] <rick_h_> jrwren: there's json libs that use c-helpers to go faster
[21:26] <rick_h_> actually thought the built in json did now :/
[21:28] <cmaloney> lo
[21:28] <jrwren> rick_h_: they suck.
[21:28] <jrwren> its like whoever wrote json and simplejson weren't python programmers and weren't C or Java programmers either.
[21:29] <jrwren> I'm pretty sure with a minor incision, I can make it much faster for my meniacle use case.
[22:42] <Havenstance_> ...
[22:43] <Havenstance_> so I get home, old lady packed up the house, she gone...
[23:01] <gamerchick02> whoa really? :(
[23:44] <jrwren> i got simplejson to do what I want. it ain't pretty.