[16:55] <teward> so an interesting observation: i'm getting kernel panics attempting to install 18.04.1 on an HP Z400 workstation o.O
[16:56] <teward> can't even boot the installer
[18:21] <RoyK> teward: first up: run a memory check http://memtest.org/
[18:37] <JanC> is memtest86+ upstream dead or dormant?
[19:56] <compdoc> dormant, I think. They still answer questions, or did. I use the UEFI version of test on the memtest86 site most the time, but I think memtest86+ works ok
[20:06] <tomreyn> not on amd zen
[20:07] <tomreyn> but then HP Z400 is intel xeon
[20:15] <teward> RoyK: sorry been without internet until now.  I'll test when I get home.
[20:15] <teward> tomreyn: and yes it's a Xeon processor :P
[20:15] <teward> 16.04 worked, 18.04 worked for a while then some kernel update i think torched everything
[20:15] <teward> i'll have to see if I can't get the actual kernel panic error data
[20:18] <RoyK> teward: if you have another machine nearby, setup netconsole to log its stuff there
[20:21] <teward> RoyK: there's a way to do that even if I can't boot into the isntallers?
[20:21] <teward> *literally* can't get even into an interactive console
[20:22] <teward> instant kernel panic whenever I try and get past the splash
[20:22] <RoyK> teward: oh - did you try to run that memtest?
[20:23] <teward> again, not at home yet.
[20:23] <teward> [2018-10-21 16:15:03] <teward> RoyK: sorry been without internet until now.  I'll test when I get home.  <--
[20:23] <teward> not home yet won't be for another couple hours.  On my laptop with my mobile phone hotspot currently.
[20:24] <teward> will follow up once i am home :|
[20:25] <RoyK> o
[20:25] <RoyK> ok
[21:08] <Checkmate> hello what's 3proxy option at fail2ban ?
[21:09] <Checkmate> i'm trying to block proxy's joining at my website
[21:14] <tomreyn> 3proxy is apparently a http proxy server product from russia
[21:14] <tomreyn> that's based on the fail2ban filder.s/3proxy.conf file
[21:15] <Checkmate> @tomreyn i'm trying to ban somebody that browse my 2.php url page multiple time its like an attack
[21:15] <tomreyn> actually it does multiple protocols, also socks
[21:16] <tomreyn> maybe you nee dto write the software so that it can't be easily abused.
[21:16] <Checkmate> whats the best method to do that
[21:16] <tomreyn> unauthenticated cleints should not be able to cause high server loads
[21:17] <Checkmate> he create high traffic and lagg by browsing same page multiple time
[21:17] <tomreyn> if modifying the application itself is not an option, see what you can do with caching, rate limiting, throwing resources at it.
[21:18] <Checkmate> do i need to use iptable or fail2ban?
[21:23] <tomreyn> depends on how you're trying to counter it.
[21:24] <TJ-> Checkmate: you could rate-limit NEW tcp port 80 connections from the same origin using iptables
[21:25] <Checkmate> @TJ- --seconds 60 --hitcount 4 is good ?
[21:25] <TJ-> Checkmate: see "man iptables-extensions and the "connlimit" module; it has some very useful examples too
[21:30] <TJ-> Checkmate: or there's "haslimit" for rate-limiting the packets or bytes
[21:30] <TJ-> grrr, "hashlimit"