How it networks

May 3, 2019 7:40 PM

Tyggna

Views

95230

Likes

2311

Dislikes

33

Since my last post was way more popular than I wanted it to be, and because literally one guy said he'd be interested in another, here you go: a detailed description of how computers network. Buckle up, this stuff has been built on and developed since the 1940s and this is likely going to take longer than one of grandpa's stories that don't really go anywhere, like that time when . . . oh, right

Edit: Other posts I've done
How it internets - https://imgur.com/gallery/9Lj7bwM
How it boots - https://imgur.com/gallery/8E2rdDp
How it stores - https://imgur.com/gallery/SR50IS3

Let's start with where you're at. Most of you are reading this from a phone or a computer. We'll start with the phone since cell and wifi are kinda similar.

So, if you haven't checked your wifi, you're connecting through the cellular network. Your phone is sending a radio signal to one of those hideous-looking cell towers, and getting a radio signal back.

It's not all that different from the radio in your car, but that works between 80mhz-110mhz. Cell towers, for data, are at the 700mhz range. What the crap does that even mean, though?

Time to bring up painful memories of math classes gone by. Sines and cosines, they're a wave, right? Well, that's what this frequency refers to, a sine wave and how many times per second it goes up and down.

The way that moves data to your phone is pretty cool, actually. We can add two waves together to make a unique wave, but since we already agreed on the frequency (the Carrier wave pictured above) we can just subtract that out (and, ok, we play with the wave a little bit more than that to give cleaner signals, but that's the idea) and we're left with the signal we care about.

The actual frequency you connect at will depend on where you live and who your cell provider is. Your cell phone sends out signals on that frequency, and the cell tower subtracts out the carrier wave, and then translates what's left into binary the computer can understand.

Well, that's the ideal case. In reality, a lot of what arrives gets translated into something the computer can't understand. This happens because people turn on a microwave, or some weird crap happens from the sun, or even something as stupid as a pigeon is flying somewhere nearby. . .carrying a magnet. The point is, a lot of data gets lost and garbled along the way, and the cell tower and your cell phone have to throw it away. When we lose enough of the data you see your signal strength drop a few bars, or just perceive a bad connection. Your cell is constantly sending a signal to the cell tower saying "yeah, I'm still here" and getting one back to determine what the signal strength is.

So, now we've gone from radio to binary. The process is the same for your Wi-Fi, it just uses a different frequency and less total power is required than the cell tower. There's also some differences in the specifics of how it says "yeah, I'm still here" between the cell tower and your router, but principal is the same.

And if you're an elitist like me, you wire in with an Ethernet cable. For Ethernet, it's not that complicated. Your device has a physical media access controller (MAC) which throws some of its own information to mark the start and end of a message and then ships the binary off to wherever you're connected.

But shipping a few bits of binary around is hardly adequate to facilitate the next imgur GIF war, and...wait, if we're literally sending our bank information out through radio waves that ANYONE (with a certain level of understanding) can receive, then we need a way to protect that information and ensure only the intended cell-tower or router can actually understand it.

Enter encryption. Cryptography is a huge subject and terribly complex, so I'm going to abbreviate and simplify it with two analogies.

tl;dr version: Encryption happens and it's a bit weird, but it works (and if that's good enough for you, skip to the next picture).

First case, you and your friend both have a copy of a key. Whenever you use this key, only that same key can be used to unlock whatever box it locked. As long as no one else gets a copy of your key, or breaks the box, whatever you use it on is safe. This is how cell towers and wifi work, and the more technical term for it is symmetric encryption.

Your key is in your SIM card for cell towers and kinda covered by your wifi password for your wireless router. The wifi password actually just says that this device is cool enough to get in the club and the router makes a key for both of them after putting it in, then shares that. It will change what key it uses from time to time to limit the risk of someone catching that key and making a copy of it while it's in flight.

These secret club-house keys are how a lot of encryption works, but the "grab in flight" is still an issue and you have to implicitly trust who you're talking to for it to work.

In the second analogy, imagine that you own a key that splits into two parts. One half of the key can unlock, the other half can lock. The half that can lock, you give copies of that to your friends, and the half that can unlock is a secret. Your friends all give a copy of their public-half to you, and you can lock up anything you want with their key and only they will be able to unlock it so long as they keep their unlock-half a secret. Since these are magic keys (i.e. math), the keys actually can work kinda in reverse too! What I mean is that one half can always unlock what the other half locked and vice verse. So, if your friends want you to verify it was actually them who sent the box, they can use their secret-private key to lock the first box in another box, and then the copy of their not-so-secret public key can unlock the outer box, then your secret key can unlock the inside box.

The second analogy is how SSL/HTTPS works (and is called asymmetric encryption), and that's what your computer means when it shows you that little green "locked" icon by the URL of the site you're visiting. When it shows a yellow locked icon, that really only means that your browser isn't sure they trust the other guy's keys for whatever reason, but it's still encrypted. The whole chain of trust is a fun area to explore, and feel free to talk with me about it at our next key-signing party.

At the end of it all, we end up with binary data that looks like complete nonsense until it is mathematically unlocked with a key. After that, we have real network data that we can work with.

So, now that our connection is secure and we've gotten the usable data from it, what happens next? We have data sitting on a cell tower anxiously waiting to request a new cat video, and we need our cat videos dagnabit!

As with most things on computers, the "data" we have is conceptually split into two parts--the information and the instruction. Both of these together is called a packet (and I'm gonna limit things to the IP stack, and just IPv4 here for you network guys, but know I lament the lack of adoption of IPX with you, and IPv6's slow adoption). The instruction comes first, and it's called the packet header. This header contains all the information needed to get the information (called the payload) to the next-closest place to its destination, called a hop.

The way this data moves around is through a network routing device. In ye olde times, they were called hubs, and hubs just took whatever information was put in on one port and then spat it out on every port and left it up to the computers connected to it to decided whether they wanted it or not. Well, that wasn't efficient, or secure, or even very functional, so we decided to make hubs intelligent and actually read/write to each individual port as needed.

We call these network switches, or just switches for short. Anything with a port that you can plug into nowadays is a switch, but the hub concept still kinda applies for wireless--we just use encryption and hardware IDs to limit the network traffic to the intended device.

That's nice and all, but what do switches actually do? Routing, in a nutshell. The concept isn't all that different from those old-timey telephone operators. When they received a call, they asked how they could direct it, and the person told the operator. Using addresses and numbers and a bit of specialized training, the operator would move some cables around a switch board and then the two phone lines would connect so people could talk.

In a computer network, there's a whole lot less people-skills involved. Everything is a number, and the specialized training for a computer is how they interpret those numbers into an action.

Switches are actually very specialized computers, but are capable of processing quite a bit of information (anyone ran DOOM on a Cisco switch yet?). The main difference between a switch and your computer is specialization. Switches are designed to process very simple, almost identical, bits of data in almost no perceivable time.
What they process isn't that much of a mystery. The keep a record of everything they're actively connected to, called the routing table, and how long it takes for them to talk to what they're connected to. What gets stored in the routing table depends on who made the Switch, or programmed the computer.

Your computer has one too! If you're on windows, run a command prompt (cmd or win+r cmd) and type "route print." (or don't, I'm not your boss) Linux guys, it's "ip r" and Mac, who cares, you paid extra money so you didn't ever have to worry about this stuff, right? (j/k it's "netstat -nr" in an iTerm and that will work for some Linux guys too)

Here's an example of Window's output:

This part gets complicated. tl;dr is that computers have an address book in them and IP addresses have a prefix which lets them route traffic.

There are some specialty addresses that were created by the wisdom of the ancients. 127.0.0.1 is the most common and it's a way for the computer to talk to itself so it can test the network hardware without having to worry about the cabling, switch, and all that stuff. In fact, all but the top 4 lines are specialty addresses. They can be used with the same versatility as any other address.

And when I say "lines" I mean just the lines that are all numbers. The first line says, in rough English, "If you have no idea where this traffic is supposed to go, send it to 10.20.32.1 (your router), and tell it that you're located at 10.20.36.4)"
The Metric at the end is a "priority" for that route, and each switch and OS interprets that a bit differently. Here, it looks like the higher numbers are checked first.

Everything else is just clever matching, and many of you are likely familiar with an IP address. What might be a little less familiar is the Netmask. The netmask is part of the IP address, in a way.

The IP address alone isn't enough. We also need to know the neighborhood where that address lives. By analogy, remember that computers are really very stupid and only know how to speak some types of numbers. Giving a computer an address that included a city, and a country would be really messy to work with, so instead all our addresses are just numbers and we use the class to specify whether it's city, state, country, ect.. To make the programming simpler, we don't use cities at all, but rather just give an address to each piece of networking equipment.
The switch is specified as a gateway in most cases, meaning that for anything outside our current class of address, we'll forward traffic to the switch.
The address is categorized by the bit-mask associated with your IP address. So, when you see something like 192.168.1.3/24, the /24 is the subnet mask (it also looks like 255.255.255.0 because well, binary. That translates to 11111111.11111111.11111111.00000000, which is 24 ones and who in there right mind wants to type that out?) and that tells us which parts are used to find the entire network we're looking for, and which parts are used to find a machine on the network. Your switch/router will usually be 192.168.1.1 and will pickup any traffic intended for a different neighborhood.
If you've been to a website before and made a connection, there's a good chance that the full internet-ip-address path to that website is stored close by. It creates that road-map by bouncing to switches on higher-class addresses looking for one that is "closer" to the final destination IP address.

0.0.0.0/0 as a network address means "any and every, I don't really know." So, for this example routing table, the top entry means "send anything that doesn't match below to my gateway". Your router in your house has a gateway to your ISP which then has a gateway to the general internet, which I'll cover in another post.

The only way computers really have to map out these roads is known as ARP (Address Resolution Protocol). They basically scream out "anyone home?" and hope someone responds. If someone does respond, then the switch and routing table can be updated with that information.

(image stolen from https://www.ampercent.com/how-to-connect-two-computers-without-a-router-or-wireless-connection/6587/)

Now we have enough to get two computers to talk to each other, but we haven't talked about any social graces or norms between the computers to get them to talk. You may have heard/seen the letters TCP/IP, and we've, so far, only covered a portion of the IP on that (Internet protocol, for those who are curious).

TCP covers a lot of what gets said, but it's only one of a dozen ways computers can talk to each other inside of the IP stack. I'll go over the top 3: ICMP, UDP, and TCP.

ICMP (Internet Control Message Protocol) is better known as "ping." It just asks basic questions like, "you there?" or "I sent you my ping, how long is it gonna take for you to respond?" ICMP is meant to be super lightweight and is very analogous to smoke signals. No real data gets passed here, it's just there to indicate status. I'm sure the Beacons of Gondor work just as well, but are probably a tad slower.

UDP is User Datagram Protocol, but no one ever remembers that. It's better to think of this as a "fire and forget" way of talking. UDP is used heavily for games and gaming because it's super light on network traffic, and if a few bytes go missing and never actually arrive, then it doesn't matter. When playing, oh, let's stick with the classics and say Quake, your current position on the map is sent via UDP because your most current position is the only one that's important. If you lag and packets stop arriving, you'll "rubber band" back to where the server thinks you are.

TCP (Transmission Control Protocol) is a 500lb gorilla in comparison. TCP does a very intricate back-and-forth with the intended receiver. It's kinda like that pesky kid during your awkward adolescence that constantly badgered you saying, "hey, you there? can you hear me? You listening?"

If you wanted to send me a Paul Revere style message of "2" then UDP would give you a single 2 and hope you saw it. TCP would make sure you're watching and then once it had your attention would send several thousand "2"s until you shouted at it to shut-up.
TCP guarantees that your data will arrive. It doesn't guarantee that it will arrive in any particular order (but each packet gets a number so it can piece it together afterwards), and it will only ever give up after you tell it to (by timeout or completion).

Web pages work via TCP, and basically everything on the internet. Some games even use it, but that's a mistake for most of them. It is, by far, the most popular way for computers to communicate.

That's the basics of networking. If this is popular enough, I'll do the second part on how the general internet works.

As always, if I'm wrong or missing something important, correct me and I'll update the post and if it's something major (i.e. we DM and you explain it to me) I'll give you credit.

computers

computer_science

science_and_tech

pcmasterrace

keep this series going, please. people want to know.

6 years ago | Likes 2 Dislikes 0

Nothing from NextGenHacker’s “Tracer T”

6 years ago | Likes 2 Dislikes 0

You're explaining TCP/IP on Imgur? You are an ambitious man. Also, Gigabit Ethernet master race reporting in.

6 years ago | Likes 3 Dislikes 0

This is great keep them coming please.

6 years ago | Likes 1 Dislikes 0

Datagram?

6 years ago | Likes 24 Dislikes 0

For those who want to learn the more specifics - watch Professor Messer's Network+ videos.

6 years ago | Likes 10 Dislikes 0

IE: My school's stand in teacher because no on they hire is capable of teaching. TBF we also use Testout and the packets that pearson vue

6 years ago | Likes 1 Dislikes 0

and comptia ship out...

6 years ago | Likes 1 Dislikes 0

As someone who's career is built around this, it is well explained. Deserves my upvote!

6 years ago | Likes 3 Dislikes 0

Networks are all fine and dandy until you have 80-ish vlan managed switches that are over 15 years old in a warehouse in Phoenix in July

6 years ago | Likes 4 Dislikes 0

Man those temperature track alerts for that have got to be going apeshit.

6 years ago | Likes 2 Dislikes 0

As an EWO, your perfectly square modulating wave annoys me. There is no such thing as 100% instantaneous amplitude.

6 years ago | Likes 4 Dislikes 0

"Doom on a Cisco switch" Hell, had you given me that idea a few years earlier I would've definitely tried it in my university's network lab.

6 years ago | Likes 4 Dislikes 0

Sooo many people are lost after the first sentence but good try on explaining it.

6 years ago | Likes 8 Dislikes 0

yeah, I probably leaned to heavily towards "precise" rather than readable. Thankfully, most the weird stuff can be glossed over

6 years ago | Likes 5 Dislikes 0

Some posters just want to watch the world learn...

6 years ago | Likes 3 Dislikes 0

/a/St20YSI

6 years ago | Likes 1 Dislikes 0

ugh just please for the love of goodness do not let people forget about IPV6.. and its current usage..

6 years ago | Likes 1 Dislikes 0

I honestly see little point to using IPv6 inside home networks.. or even some office networks (unless really big)

6 years ago | Likes 1 Dislikes 0

I finished my degree before IPv6 was even a thing - soo most of my info is all online about it.

6 years ago | Likes 1 Dislikes 0

I once told a NTP joke, the timing was perfect

6 years ago | Likes 34 Dislikes 0

this is in a whole other strata to me

6 years ago | Likes 6 Dislikes 0

That UDP joke was pretty good, this ntp one is good too. I’m going to steal them

6 years ago | Likes 5 Dislikes 0

Very nice writeup. Read mostly to see how you put it, but you did so in a well-organized and easy-to-understand way. Updoot for good 411

6 years ago | Likes 3 Dislikes 0

I usually use the 'colored glass' analogy as a fallback for when 'magic keys' doesn't stick well. Actually explaining a given cipher? Yeeha!

6 years ago | Likes 2 Dislikes 0

You make TCP much worse than it is. A retransmission doesn't happen until a set period of time has passed without an ack.

6 years ago | Likes 8 Dislikes 0

yeah, but if you snoop the traffic, after the ACK, you can easily get 2k copies of the same packet in the transfer in under 1s

6 years ago | Likes 5 Dislikes 0

With TCP the order of arrived telegrams is guaranteed. Only when using UDP, the order is not guaranteed.

6 years ago | Likes 2 Dislikes 0

"It arrives out of order and then re-assembles it into the intended order" does that sound better to you?

6 years ago | Likes 3 Dislikes 0

6 years ago | Likes 2 Dislikes 0

You lost me at packets. Im send this to my mom. She was so confused on wifi and internet. I just said it’s magic in the air that makes -

6 years ago | Likes 3 Dislikes 0

It work mom. Dont try to understand it. It just works. Seems good enough for her. She calls wifi magic in the air now

6 years ago | Likes 2 Dislikes 0

No wonder the water don't work. The pipe's clogged up with wires.

6 years ago | Likes 3 Dislikes 0

How can I live in this world that allows me to give you only one upvote?

6 years ago | Likes 4 Dislikes 0

this. is my entire major.

6 years ago | Likes 60 Dislikes 0

This is one of my classes as a computer engineer "Internet protocols" (simplified).

6 years ago | Likes 6 Dislikes 0

Not a bad intro, but this shouldn't be a major subject but a basic level into into layered networking.

6 years ago | Likes 2 Dislikes 0

yeah I had to take this in Intro to networking course.

6 years ago | Likes 1 Dislikes 0

What major?

6 years ago | Likes 11 Dislikes 0

Tom

6 years ago | Likes 1 Dislikes 0

Mine is "Networking Security & Engineering", this post is also my complete major

6 years ago | Likes 8 Dislikes 0

IT Security & Network Engineering.

6 years ago | Likes 2 Dislikes 0

What major?

6 years ago | Likes 1 Dislikes 1

It could be similar to my major, Networking technology and administration.

6 years ago | Likes 1 Dislikes 0

Computer Networking probably

6 years ago | Likes 3 Dislikes 0

There's some wrong stuff in here, but good enough for government work. One thing worth correcting: IP addresses don't have classes anymore.

6 years ago | Likes 4 Dislikes 0

Yeah, I pointed out that classfull addressing has been replaced by CIDR

6 years ago | Likes 1 Dislikes 0

Yeah, I pointed out that classfull addressing has been replaced by CIDR

6 years ago | Likes 1 Dislikes 0

Alright, I'll replace it with CIDR terminology

6 years ago | Likes 1 Dislikes 0

oh? That term fell out of favor? Still, I gave the full subnet explanation. . .

6 years ago | Likes 1 Dislikes 0

Classless subnetting was one of the efficiency moves used to preserve as many IPv4 addresses as possible in the 90's.

6 years ago | Likes 1 Dislikes 0

It’s not a term. There is no A,B,C classes to ip addresses any more. CIDR notation allows 192.">0.0/8">192.168.0.0/8 or 10.0.0.0/24

6 years ago | Likes 1 Dislikes 0

Supernets can be 192.168.1.0/23

6 years ago | Likes 1 Dislikes 0

Step 2: ... and then a miracle happens

6 years ago | Likes 1 Dislikes 0

"Cell towers are at 700Mhz" - depends where you are. The 2 phones next to me are currently on 4G at 1800Mhz and 2600Mhz.

6 years ago | Likes 3 Dislikes 0

The frequency that your phone uses depends on the market and which carriers have rights to the frequencies in that market.

6 years ago | Likes 1 Dislikes 0

*network infrastructure real estate agent here

6 years ago | Likes 1 Dislikes 0

/cell tower developer

6 years ago | Likes 1 Dislikes 0

"The actual frequency you connect at will depend on where you live and who your cell provider is" 5G networks will go up to 8Ghz

6 years ago | Likes 2 Dislikes 0

6 years ago | Likes 3 Dislikes 0

so badly want to correct OP, but so hard to not sound like a dick doing it...

6 years ago | Likes 5 Dislikes 0

I've been told I sound like a dick just explaining this stuff--it's part of the job. What needs fixin?

6 years ago | Likes 5 Dislikes 1

ICMP has other types of messages other than ping. For ex. to respond from a firewall when something is blocked or to negotiate package size.

6 years ago | Likes 1 Dislikes 0

I really like your posts though. Great work!

6 years ago | Likes 1 Dislikes 0

But can you explain screensavers?

6 years ago | Likes 98 Dislikes 2

Ricky?

6 years ago | Likes 2 Dislikes 0

I waited to hit the corner..

6 years ago | Likes 4 Dislikes 0

Screensavers date back to CRT monitors. Monitors used to glass coated in Phosphor, which burns out as it's used. ss makes it burn more even

6 years ago | Likes 33 Dislikes 0

I remember having a degauss button

6 years ago | Likes 9 Dislikes 0

Is/was there a particular reason to use screensavers and not just turn the display off, or send a blank screen?

6 years ago | Likes 2 Dislikes 0

Suddenly sending a blank screen looks like the computer just broke to the uninitiated

6 years ago | Likes 2 Dislikes 0

erm, cruise control for cool! (but from a tech perspective, turn off is always better nowadays)

6 years ago | Likes 7 Dislikes 0

Nowadays I'd imagine so, I was just wondering if screensavers were preferred on CRT for some reason.

6 years ago | Likes 1 Dislikes 0

the power to start them was significant, and older ones took a minute to "warm up" so it was a convenience thing

6 years ago | Likes 9 Dislikes 0

Man, Dazzle SS back in the day brought all the boys to the yard. If you wanted girls, you'd better know how to play a midi or a trackermod.

6 years ago | Likes 1 Dislikes 0

Switches don’t route nor generally have routing tables...that would be a router. Switches don’t care about IP addresses.

6 years ago | Likes 11 Dislikes 2

nearly every commercial switch (and most residential) is a combo of the two nowadays, switch is more for commercial, router for residential

6 years ago | Likes 5 Dislikes 0

Layer 2 switches, layer 3 switches, and routers are all used at the Enterprise level. Home routers are combos of two of those and more.

6 years ago | Likes 3 Dislikes 0

Til you get to the Enterprise or service provider level. Layer 3 devices = more $$ and our customers don't know how to use them anyways.

6 years ago | Likes 1 Dislikes 0

Except layer 3 switches

6 years ago | Likes 5 Dislikes 1

Not really - It's not switching, it's slow-speed routing on a switch CPU...

6 years ago | Likes 2 Dislikes 0

which is every Ethernet switch you can buy now, and most the fiber ones are layer 3 too now, I wanted to avoid OSI model here

6 years ago | Likes 3 Dislikes 0

You are correct some switches can route, but the purpose of L3 switch routing is for routing across vlans, not intended for across networks.

6 years ago | Likes 2 Dislikes 0

There are plenty of non-layer 3 switches. The cheapo netgear crap you buy from the Best Buy is layer 2. The Ubiquiti one behind my 1/

6 years ago | Likes 2 Dislikes 0

monitor is layer 2. They're extremely common and good for any application where you don't need network segmentation. 2/2

6 years ago | Likes 1 Dislikes 0

I bought a book that said it would avoid the OSI model in favor of the TCP/IP model and then immediately launched into the OSI model.

6 years ago | Likes 1 Dislikes 0

Nice write up. But curious. Show of hands... who here is not "reading this from a phone or a computer." and what magic are you using? :)

6 years ago | Likes 42 Dislikes 0

I am blind and have one of those Geordie Shore Laforge headsets.

6 years ago | Likes 2 Dislikes 0

Does not reading it because my glasses is making all the text on imgur wavy and giving me a headache count?

6 years ago | Likes 2 Dislikes 0

You don't know how to whistle down the phone line? Casuals....

6 years ago | Likes 11 Dislikes 0

My local telcom went fiber/digital service couple years ago. In or Out of band signalling like the 2.6kHz whistle would not work for me. :(

6 years ago | Likes 4 Dislikes 0

I'm reading it by looking at the waveform the Wi-fi packet makes on my oscilloscope. You?

6 years ago | Likes 22 Dislikes 0

6 years ago | Likes 9 Dislikes 0

Reading it from my crystal ball, i'm a wizard.

6 years ago | Likes 4 Dislikes 0

6 years ago | Likes 30 Dislikes 0

Oooo! You computer in the fridge. Easy cooling!

6 years ago | Likes 7 Dislikes 0

I printed it out.

6 years ago | Likes 38 Dislikes 0

6 years ago | Likes 8 Dislikes 0

I mashed up papyrus reeds into a pulp and carved it onto the residue.

6 years ago | Likes 3 Dislikes 0

I flintknapped for seven hours then carved it onto the back of a stone wall in a cavern in France.

6 years ago | Likes 2 Dislikes 0

I'm more OG I delivered as an oral history to live on for twenty generations

6 years ago | Likes 2 Dislikes 0

Me. -sent from Samsung Smart Blender-

6 years ago | Likes 3 Dislikes 0

That I believe. v

6 years ago | Likes 4 Dislikes 0

Wow

6 years ago | Likes 2 Dislikes 0

Back in my phone trench days, we'd pipe output from the modem pool and auth servers on a tty. Like now, everything involved is still a Compy

6 years ago | Likes 3 Dislikes 0

28.8 era dialup support was fun. Could be hardware, could be software. Either way, you've ALSO got a PBCAK.

6 years ago | Likes 3 Dislikes 0

Yeah! Compy! Rock on! I so get what we're talking about. I'm down with the lingo

6 years ago | Likes 2 Dislikes 0

Compy: Strongbadese/140char for a computer. Any device capable of digital signal version, string comparison, etc...

6 years ago | Likes 2 Dislikes 0

Digital signal analysis*. Of course, you can do those things without electronics, but you need either a brain or SOME turing machine

6 years ago | Likes 2 Dislikes 0

I like turtles

6 years ago | Likes 2 Dislikes 0

Turtles are indeed capable of mod/demoding and password auth if you have enough of them, and an infinite supply of lettuce.

6 years ago | Likes 2 Dislikes 0