## Why does the rogue’s Greater Weapon Specialization specify legendary proficiency?

The rogue’s level 15 class feature specifies:

Your damage from weapon specialization increases to 4 with weapons and unarmed attacks in which you’re an expert, 6 if you’re a master, and 8 if you’re legendary.

How can a rogue get legendary proficiency in any weapon? As far as I’m aware, only the fighter reaches legendary proficiency with weaponry, but a fighter will never be able to qualify for this feature because it comes directly from the rogue’s list of class features rather than a rogue feat. Consequently, the two states:

1. Has legendary proficiency

seem mutually exclusive. Is there something I’ve missed?

## Do spells like burning hands specify specific non-material components?

In "Does Burning Hands really require touching thumbs?", it has been established that burning hands does indeed require touching thumbs. A question that is danced around there is, "is the touching thumbs the somatic component?" This question also extends to spells like dissonant whispers (verbal component) and message (verbal/somatic component). In other words, when a spell specifies something in its description, outside the component list, that could be nonetheless be construed as the component, is it in fact a component, or even the component?

I’m inclined to think such descriptions are the component, but am unsure. This does have some weird implications if so, like "how loud does one dissonantly whisper?" and "can someone else hear my whispered message?" (I don’t need these answered here; I just include them because they are related, depending on the answer.)

## Are there features that actually specify their own bonus action timing?

The PHB States:

You choose when to take a bonus action during your turn, unless the bonus action’s timing is specified, and anything that deprives you of your ability to take actions also prevents you from taking a bonus action.

I’ve found lots of triggering specifics, but nothing that says WHEN you have to take it.

Are there example(s) where the exact timing of the bonus action is dictated and not just the triggering requirement FOR a bonus action that you then choose when or if to use.

## When MAC flooding, why would an attacker specify IP addresses and/or TCP ports?

I’m specifically referring to the macof tool (part of the dsniff package).

As I understand it, MAC flooding is meant to overload a switch’s CAM table, which maps MAC addresses to switch ports.

Where does specifying IP addresses and/or TCP ports fit into this?

Does doing so allow an attacker to bypass a Layer 3 switch’s filters, ones that filter traffic based on IP addresses and/or TCP ports?

## How does f(n) < cg(n) specify time?

I have been reading this tutorial on time complexity, and I am a bit puzzled on its explanation of big $$O$$ notation. It writes:

$$O(g(n)) =$$ { $$f(n)$$ : there exist positive constants $$c$$ and $$n_0$$ such that $$0 \leq f(n) \leq c*g(n)$$ for all $$n > n_0$$.

The way I understand it, $$c*g(n)$$ denotes $$c$$ multiplied by $$g(n)$$. If this is the case, then how does the above expression specify time, and not just that $$c*g(n)$$ is greater than $$f(n)$$? Or am I incorrect, and this is some notation I don’t understand? My understanding of time complexity is very rudimentary, so forgive me if this is just a stupid mistake on my part.

## ORACLE DB Connects only when I do not specify SID

I have an Oracle 19c database in a Unix server. SQLPLUS command connects only when I do not specify the SID.

sqlplus system/manager SQL*Plus: Release 19.0.0.0.0 - Production on Mon Jul 20 12:37:30 2020 Version 19.3.0.0.0  Copyright (c) 1982, 2019, Oracle.  All rights reserved.  Last Successful login time: Mon Jul 20 2020 11:45:41 +05:30  Connected to: Oracle Database 19c Enterprise Edition Release 19.0.0.0.0 - Production Version 19.3.0.0.0  SQL>

However, when I try with the SID, it does not connect.

sqlplus system/manager@S19110  SQL*Plus: Release 19.0.0.0.0 - Production on Mon Jul 20 12:40:01 2020 Version 19.3.0.0.0  Copyright (c) 1982, 2019, Oracle.  All rights reserved.  ERROR: ORA-12537: TNS:connection closed   Enter user-name:

I see the following in my listener.log :

TNS-12560: TNS:protocol adapter error TNS-00517: Lost contact Linux Error: 32: Broken pipe

I googled the error and tried the following troubleshooting methods but no help.

1. 6751 permission for \$ ORACLE_HOME/bin/oracle
2. Increase max number of processes in the database.

## Can movement spells that don’t specify they are teleportation bypass Forcecage?

Forcecage states:

A creature inside the cage can’t leave it by nonmagical means. If the creature tries to use teleportation or interplanar travel to leave the cage, it must first make a Charisma saving throw.

Despite external opinions about how the spell should work, is it correct to read the RAW interpretation that magical effects such as Tree Stride or Transport via Plants are capable of bypassing the saving throw as they don’t specify they are teleportation?

## Specify Location of Certificate Signing Requests in OpenSSL Configuration File?

Does the OpenSSL req command have a OpenSSL configuration file equivalent to the ca command’s new_certs_dir option? I’d like to establish a default directory for all Certificate Signing Requests ("CSRs") that are created using the req command.

## Specify Host for User in docker compose file

I’ve started messing with Docker and the MySQL 5.7 image, and have created a docker-compose.yaml file to quickly bring up a DB instance with the root password set, a new user & password created, and a new database. When I log in to the new DB, I see that the new user is set with a host of %. I would like to be able to set this to a host of my choice in the yaml, but I can’t find any docs or notes on what environmental variable to specify in the docker-compose file.

Thoughts about how to accomplish this? I did attempt to set MYSQL_USER: dbadmin@host but this just created the user as dbadmin@host with the host still set to % in MySQL.

## Why does keycloak use HS256 algorithm to sign access token when client settings specify RS256?

I have the following setup with a keycloak authentication server and an application:

1. user logs in on application client side, send un/pw to server
2. application server sends un/pw to keycloak server for a token
3. keycloak server sends a token back to application server
4. application server outputs web page with sensitive data

I want to use RS256 to sign my tokens. When I try to get a token on the client side, they are corectly signed with RS256, but as soon as I try to get one on the server, HS256 is used. How can I set keycloak to use RS256 in both cases?

I use the /auth/realms/{REALM_NAME}/protocol/openid-connect/token endpoint and keycloak 10.0.1.

Keycloak configuration:

• keys
• realm keys are HS256, AES, and RS256 (listed in this order) all with a priority of 100 (EDIT: even if I set the RS256 key priority to a higher value, HS256 is used)
• default signing algorithm for the realm is set to RS256
• client
• access token signature algorithm and ID token signature algorithm for the client are set to RS256
• the client is public
• Valid redirect URIs contain the domain where the application server is currently running (which is localhost but my computer has a domain name)
• Web origins is set to "+" (which as far as I’m aware copies entries from valid red. uris)

Google seems to return no results related to my problem.