Security

It's Never the Firewall

4 min read

This last Thursday I had the privilege of giving a talk at our local Linux User Group about diagnosing firewall issues on Linux entitled "It's Never the …

Unusable Secret Key

2 min read

I use a Yubikey NEO to store subkeys used for signing and authentication. I started experiencing a weird issue with it. It coincided with me rebuilding my …

Vultr Deny All Firewall

1 min read

While setting up new instances on Vultr for testing, I wanted to initially ensure that no traffic beyond my own could touch the instances. After adding a …

Security Principles

4 min read

While reviewing current security hardening practices put out by several organizations and attempting to filter the good recommendations from the outdated …

Vulnerable Smart Cards

3 min read

In addition to the WiFi vulnerability a much more limited vulnerability was announced around private GPG keys that were generated using Infineon's RSA Library …

A KRACK In the Defenses

2 min read

An advisory from US CERT has been circulating for the last week about a protocol level flaw in WPA & WPA2. The advisory itself was: US-CERT has become aware …

Auditd

4 min read

Auditd collects any configured syscall execution with critical security metadata associated with the event. This can help enrich other security tools such as …

AIDE

4 min read

AIDE (Advanced Intrusion Detection Environment) is a file and directory integrity checker that compares the current hashes, permissions, and attributes of files …

Better Practices With Sudo

12 min read

I work with a lot of different linux machines from embedded devices, to cloud servers and open stack hosts. For many of them I'm either the sole administrator …