cheap tunnel light led

Our History
Founded in 2005, located in Linglong Industrial Park, the west of Hangzhou.
Our Factory
ZGSM is a hi-tech and private Enterprise devoted to R&D, producing and selling of high quality LED indoor/outdoor lights, LED traffic lights, solar panels and solar powered LED lighting system and so on. As one of the patent model enterprises and the first batch of Energy-saving Service Company in Zhejiang Province, we have registered more than fifty products; we are also the members of Illuminating Engineering Society and Semiconductor Industry Association in China.
Our Product
Our products covers LED street lights, LED high bay lights, LED gas station lights, LED flood lights, LED tunnel lights, LED stadium lights and other indoor/outdoor LED lights; LED traffic lights and signal controllers; PV modules, solar LED street lights and solar powered generation systems. Our products take the advantage of energy saving, environmental friendly, long life and so on.
Product Application
Been widely used in indoor/outdoor lighting, city lighting, traffic instruction, solar power generation projects and other fields.
Our Certificate
CE, GS, UL, RoHS, CB, ENEC, SAA, DLC, LM79,LM80, ISO9001, ISO14001
Production Equipment
Chip mounter,EVERFINE GO-2000 Photometric test equipment, Vigor VG2302 Leakage current Tester, Vigor VG2679 Insula?on Resistance Tester, Vigor VG2670A Dielectric strength tester, Vigor VG2678A Ground Resistance Tester, TDS1002 Integra?ng sphere
Production Market
our products have been exported to more than 80 countries and regions
Our Service
Sales, technical and aftersales is 24hours on line for servicecheap tunnel light led
website:http://www.zgsmlightings.com/
website2:http://www.zgsm-outdoorlighting.com/

What are the best ciphers in terms of performance for SSH tunnel?

From a security standpoint, there are few good cipher options to use with SSH, such as ChaCha20, AES 128/256 GCM/CTR. As I understand (please correct me if I wrong), all of these offer pretty strong encryption.

However, what are the performance differences between aforementioned ciphers? In certain SSH tunneling applications (like tunneling NFS, for example) the performance is absolutely critical. How does one chose the cipher for the best performance, while maintaining reasonable security?

Of course I could just try and measure the difference, but this data will only be applicable to my specific hardware and particular measurement technique (in my simple benchmark AES 128 GCM seems to show the best results both in terms of throughput and low CPU load).

Speaking more general (and assuming CPU has AES-NI support):

  1. Does ChaCha20 take advantage of AES-NI?
  2. Is GCM mode faster than CTR?
  3. How does key size (128 vs 256) affects performance?
  4. Apart from the raw throughput, what ciphers tend to load CPU more?

Are there any softwares/websites that provides a service to tunnel a public URL to my localhost with port number without being timed out/terminated?

I came across Ngrok and Localtunnel but after a while, the tunnel gets disconnected/discontinued, meaning I cannot link my localhost (with port number) in Visual Studio 2015 to a public URL. Are there any free softwares/platforms to do the same thing but permanent?

Difference between SSH Tunnel / Proxy and VPN in terms of security

What befits does a VPN have over just using a regular SSH Tunnel?

I’m considering setting up OpenVPN on a server, but was wondering what benefits that would have over just using that same server as an SSH Tunnel which is very easy to setup and allows connecting via SOCKS5 which is already supported everywhere. Wouldn’t both show the same IP address as source anyways in which case you’re no longer anonymous?

SSH Tunnel seems to be much easier, just open an SSH tunnel and setup computer to connect to that port via localhost and a SOCKS5 proxy.

ssh -D 1723 -f -C -q -N user@server.com 

VPN on the other hand seems like a bit more work to setup and i’m unable to see what benefits it offers over just a simple SSH Tunnel.

OpenVPN Tunnel blocking inbound web connections

I have a server running a OpenVPN client to route all internet traffic via the VPN.

I have excluded the local subnet from the tunnel and this is all working well so far.

The server also has a webserver running, which is publicly accessible using port forwarding from my router.

The web server is only working when the VPN client is stopped. I assume when the vpn is open the packets to respond are being sent back over the VPN link, rather than back to the router.

Question: is it possible to prevent this?

I’m running Ubuntu Server 18.04.

Thanks

Routing trafffic from vpn tunnel source to other interface

We have five interfaces in the server.

I would like to route traffic from IP 10.8.0.150 behind tun0 to 10.130.219.68 behind interface em2.

I have enabled port forwarding and done IP tables rules but the traffic reaches the server but goes back to tun0, because .

How can I achieve this, to route traffic from a 10.8.0.150 behind tun0 to 10.130.219.68 behind interface em2 without interfering with other VPS communicating in the VPN (tun0)?

em2       Link encap:Ethernet  HWaddr 94:18:82:33:3a:85           inet addr:172.17.247.242  Bcast:172.17.247.255  Mask:255.255.255.240           inet6 addr: fe80::9618:82ff:fe33:3a85/64 Scope:Link           UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1           RX packets:1564 errors:0 dropped:0 overruns:0 frame:0           TX packets:336 errors:0 dropped:0 overruns:0 carrier:0           collisions:0 txqueuelen:1000           RX bytes:140656 (140.6 KB)  TX bytes:56927 (56.9 KB)           Interrupt:19  lo        Link encap:Local Loopback           inet addr:127.0.0.1  Mask:255.0.0.0           inet6 addr: ::1/128 Scope:Host           UP LOOPBACK RUNNING  MTU:65536  Metric:1           RX packets:63491 errors:0 dropped:0 overruns:0 frame:0           TX packets:63491 errors:0 dropped:0 overruns:0 carrier:0           collisions:0 txqueuelen:1           RX bytes:5828461 (5.8 MB)  TX bytes:5828461 (5.8 MB)  tun0      Link encap:UNSPEC  HWaddr 00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00           inet addr:10.8.0.98  P-t-P:10.8.0.97  Mask:255.255.255.255           UP POINTOPOINT RUNNING NOARP MULTICAST  MTU:1500  Metric:1           RX packets:78487 errors:0 dropped:0 overruns:0 frame:0           TX packets:89611 errors:0 dropped:0 overruns:0 carrier:0           collisions:0 txqueuelen:100           RX bytes:7480633 (7.4 MB)  TX bytes:24983338 (24.9 MB)

ROUTES in host server :

default         10.2.0.1        0.0.0.0         UG    0      0        0 br1 10.0.0.0        10.8.0.97       255.255.255.0   UG    0      0        0 tun0 10.0.1.0        10.8.0.97       255.255.255.0   UG    0      0        0 tun0 10.2.0.0        *               255.255.255.0   U     0      0        0 br1 10.8.0.0        10.8.0.97       255.255.255.0   UG    0      0        0 tun0 10.8.0.97       *               255.255.255.255 UH    0      0        0 tun0 10.130.219.68   172.17.247.241  255.255.255.255 UGH   0      0        0 em2 128.0.0.0       10.8.0.97       128.0.0.0       UG    0      0        0 tun0 link-local      *               255.255.0.0     U     1000   0        0 em2 172.17.247.240  *               255.255.255.240 U     0      0        0 em2

Iptables in host:

-A FORWARD -i em2 -j ACCEPT -A FORWARD -i tun0 -j ACCEPT -A FORWARD -i em1 -j ACCEPT -A FORWARD -i tun0 -o em2 -j ACCEPT -A FORWARD -i em2 -o tun0 -j ACCEPT -A FORWARD -i tun0 -o em2 -m state --state RELATED,ESTABLISHED -j ACCEPT 

Routes in 10.8.0.150:

 10.0.0.0        10.8.0.149      255.255.255.0   UG    0      0        0 tun0 10.0.1.0        10.8.0.149      255.255.255.0   UG    0      0        0 tun0 10.2.0.0        10.8.0.149      255.255.255.0   UG    0      0        0 tun0 10.8.0.0        10.8.0.149      255.255.255.0   UG    0      0        0 tun0 10.8.0.149      *               255.255.255.255 UH    0      0        0 tun0 10.18.0.0       *               255.255.0.0     U     0      0        0 eth0 10.130.219.60   *               255.255.255.255 UH    0      0        0 tun0 10.130.219.68   10.8.0.149      255.255.255.255 UGH   0      0        0 tun0 

Traceroute from 10.8.0.150:

 traceroute to 10.130.219.68 (10.130.219.68), 30 hops max, 60 byte packets  1  10.8.0.1 (10.8.0.1)  179.067 ms  179.062 ms  179.073 ms  2  10.0.0.1 (10.0.0.1)  179.083 ms  179.093 ms  179.104 ms  

SSH tunnel and reverse SSH tunnel at the same time on the same port

I have a computer A, a server B (Azure VM) and a second computer C. I want to connect from A to C through the server B.

Setup:

A: ssh -i location_of_private_key -L 12000:public_IP_of_B:20000 user@serverB  C: ssh -i location_of_private_key -R 20000:localhost:12000 user@serverB 

Testing:

A: nc localhost 12000  C: nc -l 12000 

But the first testing command (in A) fails, I can’t establish connection to B on port 20000.

What am I missing ?

Long-limbed with reach. Polearm Master, Sentinel and Tunnel Fighter. Opportunity attack slow combo? [on hold]

So a Bugbear with a polearm has a 15ft reach(Long-Limbed) each creature who enters its reach gets attacked(Polearm Master) and they must stop if hit(Sentinel) they would have to take 3 turns to be able to attack the character or anyone by/behind them stopping every time they move 5ft(Tunnel Fighter)providing the attacks hit. This seems really OP.

Polearm Master:

When you take the Attack action and attack with only a glaive, halberd, or quarterstaff, you can use a bonus action to make a melee attack with the opposite end of the weapon. This attack uses the same ability modifier as the primary weapon. The weapon’s damage die for this attack is a d4, and the attack deals bludgeoning damage. While you are wielding a glaive, halberd, pike, or quarterstaff, other creatures provoke an opportunity attack from you when they enter the reach you have with that weapon.

Tunnel Fighter (Unearthed Arcana):

You excel at defending narrow passages, doorways, and other tight spaces. As a bonus action, you can enter a defensive stance that lasts until the start of your next turn. While in your defensive stance, you can make opportunity attacks without using your reaction, and you can use your reaction to make a melee attack against a creature that moves more than 5 feet while within your reach.

Sentinel:

You have mastered techniques to take advantage of every drop in any enemy’s guard, gaining the following benefits:

When you hit a creature with an opportunity attack, the creature’s speed becomes 0 for the rest of the turn. Creatures provoke opportunity attacks from you even if they take the Disengage action before leaving your reach. When a creature within 5 feet of you makes an attack against a target other than you (and that target doesn’t have this feat), you can use your reaction to make a melee weapon attack against the attacking creature