[07:46] <lordievader> Good morning.
[08:00] <Waddup> morning lordievader
[08:00] <lordievader> Hey Waddup
[08:22] <Waddup> hey whats up
[08:23] <lordievader> Not much, having coffee. How are you?
[08:23] <Waddup> im good
[08:24] <Waddup> i just removed the raid fs im having and put on a 4tb wd red on it.
[08:24] <Waddup> i needed it to run while i test the drives one by one and see whats wrong
[16:00] <teward> no server team meeting this week?
[18:06] <teethplus> hello
[18:08] <teethplus> I was wondering if someone can point me in the right direction of finding the different subnets that a establishment may be using?
[18:10] <teward> teethplus: you'd do that at whatever handles DHCP or cross-subnet routing... what exactly are you trying to find
[18:10] <teethplus> I'm trying to find the network printers.
[18:11] <tonyyarusso> By far the easiest way would be to ask humans who ought to know.  Did someone get fired without leaving documentation?
[18:11] <teethplus> yeah
[18:11] <tonyyarusso> Oof.
[18:12] <tonyyarusso> Do you have physical access to the printers?  Most will let you either show the IP information on an LCD or print out their configuration.
[18:12] <teethplus> I'm not sure if that is an acronym or if its an automatopia
[18:13] <teethplus> yeah I can do that for the ones in the office but we have some remote and I guess I can ask someone to run through the menu for me
[18:14] <teethplus> I was just wondering if there was some way I could look it up without having to do any leg work
[18:14] <teward> you should use a print server in the future
[18:14] <tonyyarusso> DHCP = Dynamic Host Configuration Protocol, IP = Internet Protocol (information in this case being address), LCD = Liquid Crystal Display
[18:14] <teward> teethplus: not really, not without nmap scanning the universe.
[18:14] <tonyyarusso> Oof = just an exclamation
[18:14] <teward> i.e. 10.0.0.0/8, 127.16.0.0/18 (i think?), 192.168.0.0/16
[18:15] <teethplus> thanks for clearing that up tony
[18:15] <tonyyarusso> teward: Pretty sure the middle one is 172.16, not 127.
[18:15] <tonyyarusso> But, uh, Wikipedia.
[18:16] <tonyyarusso> It might be /17 too
[18:16] <tonyyarusso> Now I'm going to have to look it up or it will bother me.
[18:17] <teethplus> well thanks guys, I guess I will have to check all the printers manually
[18:17] <tonyyarusso> Right on the numbers, wrong on the mask.  10.0.0.0/8, 172.16.0.0/*12*, and 192.168.0.0/16.
[18:17] <tonyyarusso> Obviously it had to be between /8 and /16.  We're idiots.  :)
[18:19] <tonyyarusso> teethplus: Scanning the entire RFC1918 ranges might work for you, but poring through the results is probably more work than phoning someone up at each remote site and having them look at the device.  (And will only work if your firewalls allow it.)
[18:20] <teethplus> Its never easy is it.
[18:20] <teethplus> Thanks again for your help
[18:21] <tonyyarusso> Of course not - that's why we get paid ;)
[18:22] <teethplus> Wait what? that changes everything jk
[18:29] <sarnold> tonyyarusso: avahi-browse -alr might get you there
[23:05] <fishcooker> how to negate routing in case on vpn i want all connection to certain network will use this routing rule, others will use default route/gateway?
[23:06] <TJ-> Use a separate routing table for the VPN
[23:08] <fishcooker> on which file TJ-
[23:08] <TJ-> fishcooker: See "man ip-route" and the section of "Route tables"
[23:19] <TJ-> fishcooker: the concept you need is "policy routing". The iproute2-doc package might contain more info. There are also many web resources
[23:20] <sarnold> see also http://lartc.org/howto/lartc.rpdb.html
[23:21] <fishcooker> thankyou TJ- + sarnold
[23:21] <fishcooker> if we have default password for root then we want to make it pronounceable for easy remembrance.. how to do that?
[23:22] <TJ-> !root | fishcooker
[23:23] <sarnold> fishcooker: diceware is popular; you can also use passwdqc's pwqgen program, screenshot here http://openwall.com/passwdqc/screenshots