jks
About
- Username
- jks
- Joined
- Visits
- 35,586
- Last Active
- Roles
- Member, Administrator, Moderator
- Points
- 600
Reactions
-
Still determining local interface address??? What's that mean???
-
VDSL filter for the Kiwi SNR measurement
I've prototyped a VDSL "filter" to be used with the Kiwi SNR measurement (I used kiwirecorder for the prototyping). I works well for the one Kiwi I know about that has bad VDSL noise, causing it to have inflated SNR values.
If you know of other Kiwi's with this problem please comment here or email support@kiwisdr.com so I can try them out -- Thanks.
Basically, once the VDSL segment is identified it is excluded from the SNR measurement. Same as we have now for masked frequency segments.
-
v1.814,815
"/" is considered one of the keys that are redirected to the frequency field (also 0-9
. , : - # k M
enter/return backspace/delete). And that must be terminated by an enter/return. Because instead of a plain "/" you could have typed "/low,high" or "/width" (passband specification) as the frequency field help shows. -
Hackers be hacking..
From the admin console type:
cdk; rm opt.debug
and then restart. That will stop those additional logging messages.@smg Running fail2ban would kill the Linux realtime response causing the audio to break up as the Kiwi server process becomes starved for CPU cycles. You can't run a heavy process like a Python interpreter at the same time. We are already extremely lucky that running kernel iptables filtering and user mode frp proxying doesn't cause trouble.
-
Hackers be hacking..
@F5LFE This is really interesting to me because it seems to be an admin connection attack. I'll bet each of those is trying with a different password.
Here's something you can do to verify that. With the admin console type
cdk; touch opt.debug
. And then click the restart button on the admin control tab. This will print more messages in the log when someone connects including the attempted password. See if it changes each time.Look for log entries of the form:
PWD admin admin RESULT: allow=0 pwd_s=<actual admin pwd> pwd_m=<attempted pwd> cant_determine=0 is_local=0 is_local_e=0 [IP address]