[02:06] <yellowstar-It> Think I shall go over https://voices.canonical.com/ this morning .
[02:07] <yellowstar-It> Gotta be some movement on the b-blogs.
[02:07] <yellowstar-It> connection on mobile not so brill, thou.
[07:31] <dwatkins> ahoy
[07:31] <SuperMatt> top of the morning to you
[07:37] <dwatkins> is it a bank holiday in England today? Somehow it isn't one in Scotland.
[07:37] <SuperMatt> it is
[07:37] <SuperMatt> I hope
[07:37] <SuperMatt> or I'm getting my butt fired tomorrow
[09:35] <brobostigon> morning boys and girls.
[09:59] <bashrc> morning
[10:08] <brobostigon> morning bashrc
[15:13] <Azelphur> I've finally decided to get grumpy with my mobile carrier (3) about their tethering detection xD
[15:14] <Azelphur> gonna try and get them to give me tethering for free, so far I've got their network team dealing with the first app that I know triggers tethering detection
[15:17] <dwatkins> which app, Azelphur?
[15:17] <Azelphur> pvstar+
[15:17] <dwatkins> I'm with Three, and I believe I'm not allowed to tether, but I've never had any problem with the Android access point functionality
[15:18] <Azelphur> I actually want to use that app, which is annoying
[15:18] <Azelphur> dwatkins: feel free to try it, install pvstar+, try to do a video search, enjoy your disconnection xD
[15:18] <dwatkins> I assume you're tethering a separate Android device
[15:18] <Azelphur> I'm not.
[15:19] <dwatkins> oh wow, so it's on the same device and it has an issue
[15:19] <Azelphur> exactly
[15:19]  * dwatkins installs it on his Android phone running gingerbread
[15:20] <Azelphur> they use layer 7 detection, which is completely stupid and broken, and I'm going to continually trigger it (from the phone) until they turn it off xD
[15:20] <penguin42> it's bound to happen - their is no way for them to know that tethering happens, so it's going to have to be heuristics based on data flow - and they're going to get wrong especially as phones get more powerful and run more stuff
[15:20] <Azelphur> penguin42: sure there is, use the TTL.
[15:20] <dwatkins> I assumed they looked at packet encapsulation or something
[15:20] <dwatkins> i.e. secondary MAC address behind the phone
[15:21] <Azelphur> dwatkins: nah, they do Layer 7 / DPI, they are literally violating your privacy :P
[15:21] <Azelphur> you can tether quite happily without tethering detection at the moment, so long as you don't do anything that sets off the Layer 7
[15:22] <penguin42> Azelphur: If the phone is doing NAT I'd assume that it could also reset the TTL
[15:22] <Azelphur> penguin42: sure, but on the same basis I can just VPN and tether, there will always be ways to bypass this sort of detection, but they should at least use the method that doesn't interfere with the phone under normal conditions :)
[15:23] <Azelphur> that and the whole privacy implications of DPI
[15:23] <penguin42> Azelphur: I don't have a 'privacy' problem with DPI - humans shouldn't see the data
[15:23] <dwatkins> awesome, works great even if I lock my screen
[15:23] <Azelphur> penguin42: they obviously can see the data, how do you think they are debugging this issue and gonna have it fixed within 72 hours? ;)
[15:24] <dwatkins> coincidentally, I was looking for an app that does exactly this :D
[15:24] <dwatkins> sorry, couldn't reproduce the problem, Azelphur
[15:24] <Azelphur> dwatkins: yea, pvstar is actually really useful
[15:24] <Azelphur> dwatkins: on wifi or something?
[15:24] <dwatkins> nope, made certain of that, I'm on Three's network
[15:24] <Azelphur> maybe they fixed it already
[15:24] <Azelphur> *tries on my phone again*
[15:25] <dwatkins> new version as of 29th March
[15:25] <penguin42> Azelphur: Right but they can see all your data - DPI makes no difference to that
[15:25] <Azelphur> no, three not pvstar
[15:27] <Azelphur> penguin42: yup it's already fixed, holy crap that was fast
[15:28] <dwatkins> it even works with a 105 minute video
[15:28] <dwatkins> took a minute to cache it, mind you
[15:29] <Azelphur> dwatkins: but not for channel searches, it seems
[15:29] <penguin42> Azelphur: Do you know if 3 run that detection stuff on the 1p/MB PAYG setup?
[15:29] <dwatkins> I havn't tried searching channels yet.
[15:29] <Azelphur> penguin42: no clue
[15:29] <Azelphur> dwatkins: try that, I just got dropped for it
[15:29] <penguin42> Azelphur: I got a 3 sim as backup for when my virgin goes pop
[15:29] <dwatkins> well, Three now know what I like listening to *shrugs*
[15:30] <dwatkins> just search for a channel by name, Azelphur?
[15:30] <Azelphur> dwatkins: yup
[15:30] <Azelphur> you'll get no results as the query is blocked, and then all internet activity on your phone will cease to function
[15:30] <dwatkins> did a search for "slow mo guys" and it's now loading their puddle splash video
[15:31] <Azelphur> I shall video it :P
[15:31] <dwatkins> good call
[15:31] <dwatkins> hmm, hang on it's now stopped playing
[15:31] <Azelphur> hehe, try and load a webpage ;)
[15:32]  * dwatkins loads google.de with success
[15:32] <dwatkins> must have just been slow loading the video
[15:32] <dwatkins> yeah, it's resumed now
[15:34] <Azelphur> video uploading \o/
[15:36] <Azelphur> dwatkins: https://www.dropbox.com/s/tpv6cfagcyixzl9/2014-04-21%2015.33.49.mp4
[15:37] <Azelphur> dwatkins: notice at 0:22, the advert at the bottom gets replaced by the three tethering detection page
[15:38] <Azelphur> and from then on all I can access is the tethering detected page, and nowhere else.
[15:38] <Azelphur> also, if you do trigger it, instead of a full restart you can just toggle airplane mode.
[15:40] <dwatkins> useful tip, but even searching for "going quantum", as you did, I don't get disconnected
[15:40] <dwatkins> perhaps it's a factor of the (immeisely old) version of Android that I'm running.
[15:40] <dwatkins> *immensely
[15:40] <Azelphur> maybe, I just did another video search and got nuked again
[15:41] <dwatkins> I assume you havn't changed the settings in the app, e.g. default search engine is "youtube"
[15:41] <Azelphur> yea, I actually reset the app to defaults a few minutes ago
[15:41] <dwatkins> ...and you have version 2.5.0
[15:42] <Azelphur> yup
[15:42] <Azelphur> maybe like you said and it behaves differently on different versions of android
[15:45] <dwatkins> yeah, I'm also running Cyanogenmod, which may not be sending certain stuff, at a guess
[15:46] <Azelphur> I wouldn't be too surprised if cyanogenmod modifies the browser user agent to prevent apps from causing problems like this
[15:46] <dwatkins> that's something I can check
[15:46] <Azelphur> how are you checking it?
[15:47] <dwatkins> server logs on my Ubuntu machine at home show: "Mozilla/5.0 (Linux; U; Android 2.3.7; en-gb; Desire HD Build/GRI40) AppleWebKit/533.1 (KHTML, like Gecko) Version/4.0 Mobile Safari/533.1"
[15:47] <Azelphur> Interesting
[15:47] <Azelphur> any easy way I can check on openwrt?
[15:48] <dwatkins> not unless you're running a webserver, all I did was open my homepage and tail-f the apache log
[15:48] <Azelphur> guess I can just tcpdump and wireshark
[15:48] <Azelphur> dwatkins: oh, no that's not relevant, it's only relevant what pvstar sends as a user agent
[15:48] <dwatkins> ah I see, yes
[15:48] <dwatkins> I guess wireshark or Charles Proxy would show what the app is sending, yeah
[15:48] <Azelphur> so you'd need to intercept the traffic (transparent proxy, or wireshark)
[15:48] <Azelphur> yea
[15:49] <dwatkins> there's an app for that
[15:49] <dwatkins> well, to se the proxy per app
[15:49] <Azelphur> yea I tried the wireshark app, doesn't seem to work for me
[15:49] <dwatkins> Azelphur: https://play.google.com/store/apps/details?id=com.lechucksoftware.proxy.proxysettings
[15:49] <dwatkins> if you need a proxy to test with, PM me
[19:18]  * SuperMatt starts throwing things at ansible
[19:18] <SuperMatt> it's good... but I think it needs maturing
[19:19] <SuperMatt> it reports that it has changed a file when it hasn't actually changed a file
[19:21] <SuperMatt> it's a little annoying if you want everything to return OK
[20:27] <moreati> SuperMatt: which module is changing that file?