teward | so an interesting observation: i'm getting kernel panics attempting to install 18.04.1 on an HP Z400 workstation o.O | 16:55 |
---|---|---|
teward | can't even boot the installer | 16:56 |
RoyK | teward: first up: run a memory check http://memtest.org/ | 18:21 |
JanC | is memtest86+ upstream dead or dormant? | 18:37 |
compdoc | dormant, I think. They still answer questions, or did. I use the UEFI version of test on the memtest86 site most the time, but I think memtest86+ works ok | 19:56 |
tomreyn | not on amd zen | 20:06 |
tomreyn | but then HP Z400 is intel xeon | 20:07 |
teward | RoyK: sorry been without internet until now. I'll test when I get home. | 20:15 |
teward | tomreyn: and yes it's a Xeon processor :P | 20:15 |
teward | 16.04 worked, 18.04 worked for a while then some kernel update i think torched everything | 20:15 |
teward | i'll have to see if I can't get the actual kernel panic error data | 20:15 |
RoyK | teward: if you have another machine nearby, setup netconsole to log its stuff there | 20:18 |
teward | RoyK: there's a way to do that even if I can't boot into the isntallers? | 20:21 |
teward | *literally* can't get even into an interactive console | 20:21 |
teward | instant kernel panic whenever I try and get past the splash | 20:22 |
RoyK | teward: oh - did you try to run that memtest? | 20:22 |
teward | again, not at home yet. | 20:23 |
teward | [2018-10-21 16:15:03] <teward> RoyK: sorry been without internet until now. I'll test when I get home. <-- | 20:23 |
teward | not home yet won't be for another couple hours. On my laptop with my mobile phone hotspot currently. | 20:23 |
teward | will follow up once i am home :| | 20:24 |
RoyK | o | 20:25 |
RoyK | ok | 20:25 |
Checkmate | hello what's 3proxy option at fail2ban ? | 21:08 |
Checkmate | i'm trying to block proxy's joining at my website | 21:09 |
tomreyn | 3proxy is apparently a http proxy server product from russia | 21:14 |
tomreyn | that's based on the fail2ban filder.s/3proxy.conf file | 21:14 |
Checkmate | @tomreyn i'm trying to ban somebody that browse my 2.php url page multiple time its like an attack | 21:15 |
tomreyn | actually it does multiple protocols, also socks | 21:15 |
tomreyn | maybe you nee dto write the software so that it can't be easily abused. | 21:16 |
Checkmate | whats the best method to do that | 21:16 |
tomreyn | unauthenticated cleints should not be able to cause high server loads | 21:16 |
Checkmate | he create high traffic and lagg by browsing same page multiple time | 21:17 |
tomreyn | if modifying the application itself is not an option, see what you can do with caching, rate limiting, throwing resources at it. | 21:17 |
Checkmate | do i need to use iptable or fail2ban? | 21:18 |
tomreyn | depends on how you're trying to counter it. | 21:23 |
TJ- | Checkmate: you could rate-limit NEW tcp port 80 connections from the same origin using iptables | 21:24 |
Checkmate | @TJ- --seconds 60 --hitcount 4 is good ? | 21:25 |
TJ- | Checkmate: see "man iptables-extensions and the "connlimit" module; it has some very useful examples too | 21:25 |
TJ- | Checkmate: or there's "haslimit" for rate-limiting the packets or bytes | 21:30 |
TJ- | grrr, "hashlimit" | 21:30 |
Generated by irclog2html.py 2.7 by Marius Gedminas - find it at mg.pov.lt!