> > I found something that in my opinion are nearly evidences. > > What exactly are trying to prove here? > > > For those who doesn't know my story please read past messages: > > https://marc.info/?a=155355261500002&r=1&w=2 > > I think I know you from before. You're the guy claiming to be hacked > over and over again, right? >
I'm the guy you find at the link, I'm not other guy. I use only this email for the openbsd misc ml. > > Well, as I said previously my laptop was been hacked then I bought a new > > laptop because my suspicious are that the uefi or other firmware was been > > hacked (I reinstalled openbsd various > > iwm0 with vpn download: 0,46 mbit/s upload: 0,55 mbit/s > > iwm0 without vpn download: 0,50 mbit/s upload: 2,53 mbit/s > > urtwn0 with vpn download: 20,88 mbit/s upload: 8,49 mbit/s > > urtwn0: without vpn download: 24,83 mbit/s upload 9,27 mbit/s > > What exactly is strange here? Two different cards behave differently. > The bandwidth of 0,50 mbit is not normal. I have one router and I'm the only user. Then or the driver is crap (I don't think so) or the card is broken (I tried a live linux and it works well) or there some configuration that limit the bandwidth. > > iwm0: round-trip min/avg/max/std-dev = 18.761/6372.615/72372.495/14987.007 > > ms > > urtwn0: round-trip min/avg/max/std-dev = 24.068/36.489/878.218/48.120 ms > > The thing I find funny is that you insist on being spied on or somehow > hacked, you act tin-foil paranoid to the point of changing your laptop > because of some unexplained behavior, yet you use Speedtest.net and > CloudFlare DNS. Are you trolling or delusional? > The thing I find funny is that in world full to the brim of vulnerabilities, the NSA that intercept entire country, vulnerability on the bios/uefi, and rootkit (this video is five years old https://www.youtube.com/watch?v=sNYsfUNegEA and this one that is a firmware worm that infect thunderbolt device which infect and other laptop https://www.youtube.com/watch?v=Jsdqom01XzY) or nic firmware rootkit (https://cryptome.org/2014/02/nic-ssh-rootkit.htm), vulnerability on cpu, or on the GSM protocols (https://www.youtube.com/watch?v=-wu_pO5Z7Pk) , openbsd developer paid to insert backdoor on ipsec stack (https://lwn.net/Articles/419865/), vendor, like apple, that pay until $1 milion for a remote kernel exploit, government that make cyber warfare and spies whitehouse candidate, Encryption algorithm that are bugged since 1995 and are removed only in 2015 (https://en.wikipedia.org/wiki/RC4#Security) and so on.. I can continue And you say I'm paranoid ? LOL I say you are living in some kind of fantasy world! enjoy https://www.youtube.com/watch?v=1i8XVQ2pswg > > As I know the traffic shaping is configured by pf with pf.conf, the > > following is my pf.conf (I'm sorry I'm not a genius of pf): > > -------/etc/pf.conf > > if="urtwn0" > > #if="iwm0" om > > block drop in on ! lo0 proto tcp to port 6000:6010 > > block drop out log proto {tcp udp} user _pbuild > > block log quick on $if > > > > Neither am I, but aren't there supposed to be some rules that pass > traffic inbound to your interface? > LOL > > Other strange things that happens on my laptop are the following: > > > > 1. sometimes my openvpn (2 times on 5) fail authentication even I use a > > saved file authentication data and pass it the data with --auth-user-pass > > /my/path/pass > > Then in my opinion it's impossible fails the authentication. > > > > Not really. OpenVPN is a temperamental piece of software that doesn't > like firewalls very much. In edge cases, it likes to fail, especially if > you use UDP > I don't use UDP > > 2. sometimes KeePassXC fails authentication on random site. If I copy the > > password and paste it by hand it works. > > Both autotype and browser plugins are dependent on so many different > technologies to work like they should. Like before, it's easy for things > to go wrong in edge cases. > never happens in recent 10 years. > > 3. and of course there are people that can spy me and modify suggested > > videos on youtube. Please do not comment this because I know it's very > > subjective. > > Same as before. Tinfoil hat paranoia yet you still use YouTube? > What is tinfoil ? and what's wrong in youtube ? > > As I said previously in my opinion there is 0day on how is implemented the > > tcp/ip stack in the kernel. > > And the vulnerability can be exploited by a mitm attack from the home > > router. > > Thank you Cord. > > And the proof is where? You are providing sparse information, impossible > PF configuration files, and anecdotal "evidence" that can be easily > attributed to user error. Instead of trying to explore how programs > you're using work, you blame OpenBSD. The only thing you make evident is > your lack of analytical approach to problem solving and ignorance of the > mailing list rules. Where is dmesg output? What HW are you using? What > browser? What router? > > Please take the list seriously or go away. I don't think that dmesg has something to do with security. User error happens 2 or 3 times, not 5 or 7 times a day. The openvpn error auth happens 2 times on 5. As I said here: https://marc.info/?l=openbsd-misc&m=155438009326648&w=2 there was been also other things like ssh key stealing. and others like, webmail session not closed well. I mean the webmail session was remained opened also with the properly logout procedure. This is not important how many times happens because just one session not properly close is a huge hole in my mailbox. The attacker just need the session cookie. But all those things was written in the previous email messages. See you knight in shining armor.

