1. 7

      I talked to @ry_brink and he will ease up on the advertising of his software. I don’t think he’s trying to spam.

      1. 2

        Thanks. Certainly conversation about it is better than acting hastily.

      2. 3

        Agreed.

        1. 1

          I’m not sure how a free tool I tagged specifically as “show” that I thought others might also find useful is considered spam, but I’ll be more careful in the future.

          1. 3

            You have posted this application 3 times in the last few weeks.

            1. 1

              They’ve actually been different applications each time: iOS App, desktop App, and slightly related web service.

        1. 3

          @ry_brink , your posts would be more interesting to me and perhaps others if you published the source, and spoke about interesting challenges, nice solutions to problems, stuff you learned, nice things the API’s you’re using do, etc. etc.

          1. 1

            Thanks for the suggestion, I’ll keep that in mind!

          1. 2

            This really excited me, so I bought the pro version, but it crashes the moment I sign in

            1. 2

              I tried the free version and that worked. Love the layout on the today screen. The realtime number on the right is a nice touch.

              1. 1

                Appreciate the feedback, and your patience! Let me know if you have any other suggestions or ideas.

              2. 1

                I’m really sorry about that. It’s a bug that (I’m hoping) is fixed in a release I pushed out moments ago. Let me know if you still have issues.

                Message me your email and I’ll send you a free promo code for the desktop version for your trouble!

              1. 4

                What are you asking? If Bob is “subletting” an IP to Joe, how could you possibly detect that reliably? Providers are supposed to include accurate information in whois, but the system relies entirely on trust and many people submitted false information even before the days of AWS.

                1. 1

                  Well, I could reliably detect “joe.com” if Joe was hosting “joe.com” on the IP and using proper TLS. I would just inspect the byte stream of his clients and scrape the hostname out of it.

                  I’m wondering if perhaps there are databases available that do this mapping for you, or any other less invasive solutions to this.

                1. 2

                  I like this idea, but on busy release days don’t you find it a little noisy? I’ve never tried using ForceCommand - I’m guessing it would work the same for automated connections via ansible as it would for interactive use?

                  Also, I’d put the ssh-wrapper script somewhere like /usr/local/bin and make it writable only by root.

                  I’d almost be tempted to filter out automated connections so that only the rare/notable interactive logins are posted to Slack. But then maybe the gain of not desensitising the channel to regular harmless logins isn’t worth the risk of an attacker disguising their harmful interactive session as a regular deployment.

                  1. 2

                    Because we use immutable infrastructure it works well. We are rarely making a lot of SSH connections to an active server, instead we deploy a new infrastructure and set this notification system up as the last step. I can definitely see how my system would be problematic on servers with a lot of automation happening regularly though.

                    Filtering out automated connections would be great. Or even just more specifically identifying the user in the notification (if possible).

                  1. 2

                    At first I saw the “How it Works” section and thought “Hey! They are going to ruin the connections for the rest of us!” but then I read the blog post and the claim is it won’t increase congestion. I guess by providing a smarter congestion algorithm that uses more information than packet loss for determining congestion.

                    I guess the main idea is don’t slow down if you see packet loss if other signs point to no congestion. And that seems really cool.

                    1. 1

                      Good summary! We definitely think so too. ;)

                      1. 1

                        Sent you a message about trying the beta.

                    1. 3

                      How does this work? The “How It Works” section is too high-level for lobste.rs, but if there’s a paper or something else more technical I’d love to read it.

                      1. 5

                        Check out the blog post here. If you have other questions let me know and I’ll do my best!

                        1. 3

                          This is what you should have posted to begin with.

                          Does this only improve performance when implemented on the sender’s side? i.e. Will this improve download speed of HarryPotter.exe if I use SuperTCP on my Mac?

                          1. 1

                            It tries to better utilize the upstream bandwidth available to the system. If you put it on a server, some client might be able to download HarryPotter.exe from that server faster, but if it is installed on the client it won’t be able to help.

                            Hope that helps.