Security
It's Never the Firewall
This last Thursday I had the privilege of giving a talk at our local Linux User Group about diagnosing firewall issues on Linux entitled "It's Never the …
Unusable Secret Key
I use a Yubikey NEO to store subkeys used for signing and authentication. I started experiencing a weird issue with it. It coincided with me rebuilding my …
Vultr Deny All Firewall
While setting up new instances on Vultr for testing, I wanted to initially ensure that no traffic beyond my own could touch the instances. After adding a …
Security Principles
While reviewing current security hardening practices put out by several organizations and attempting to filter the good recommendations from the outdated …
Vulnerable Smart Cards
In addition to the WiFi vulnerability a much more limited vulnerability was announced around private GPG keys that were generated using Infineon's RSA Library …
A KRACK In the Defenses
An advisory from US CERT has been circulating for the last week about a protocol level flaw in WPA & WPA2. The advisory itself was: US-CERT has become aware …
Auditd
Auditd collects any configured syscall execution with critical security metadata associated with the event. This can help enrich other security tools such as …
AIDE
AIDE (Advanced Intrusion Detection Environment) is a file and directory integrity checker that compares the current hashes, permissions, and attributes of files …
Better Practices With Sudo
I work with a lot of different linux machines from embedded devices, to cloud servers and open stack hosts. For many of them I'm either the sole administrator …