Schneier on Security
Schneier on Security. One of the best infosec blogs out there.
David PiniellaNetwork and Security Consulting
|
||
Cryptolocker keys made available2014.08.06
this is pretty big: http://www.itgovernance.co.uk/blog/cryptolocker-victims-to-get-files-back-for-free/ QoS / CoS on JunOS2014.08.02
anything in [square brackets] needs to be changed or specified First, define the QoS (CoS — Class of Service — in Juniper parlance) filters. This entails creating the classifiers, drop-profiles, forwarding-classes, scheduler-maps and schedulers. For the needs of this particular setup, I had to guarantee that the network control traffic (hellos, keepalives, etc) got through and the rest of the 30meg pipe that provided the office internet was to be shaped to prioritize traffic sensitive to delay (read: VoIP).
Once the CoS stuff is in place, you have to apply it to a firewall policy, so that it actually affects traffic:
The count office_voip part of the filter stanza is there just to verify that the filter is actively affecting traffic (the office_voip count should go up if it is). Further reading: http://dataplumber.wordpress.com/2011/12/30/junos-qos-notes/ Linux user auth against Active Directory2014.07.30
Enabling user authentication on linux against Active Directory, using ubuntu, sssd and AD 2008 (should work with 2003r2) apt-get install realmd sssd samba-common samba-common-bin samba-libs sssd-tools krb5-user adcli 2. vi /etc/sssd/sssd.conf and put this in it: [nss] filter_groups = root filter_users = root reconnection_retries = 3 [pam] reconnection_retries = 3 3. chmod 0600 /etc/sssd/sssd.conf 4. vi /etc/realmd.conf and put this in it:
5. run kinit Administrator@YOURDOMAIN.ALLINCAPS.TLD
You should now be able to su – to a domain user. That’s it, you’re done: you can login to your linux box by authenticating to your Active Directory domain. Additional (and optional) stuff is below, like adding groups and restricting logins based on groups.
Additional settings inside /etc/sssd/sssd.conf [domain] section to enable groups: [domain/yourdomain.allincaps.tld] ad_domain = yourdomain.allincaps.tld krb5_realm = YOURDOMAIN.ALLINCAPS.TLD realmd_tags = manages-system joined-with-adcli cache_credentials = True id_provider = ad krb5_store_password_if_offline = True default_shell = /bin/bash ldap_id_mapping = True ## comment out #use_fully_qualified_names = True ## these will need to be created manually or you will need to modify pam to ## mkdir them with pam_mkhomedir.so or use oddjob-mkhomedir, see below override_homedir = /home/%u fallback_homedir = /home/%d/%u ##group settings## ldap_group_uuid = objectGUID ldap_user_uuid = objectGUID ldap_group_member = member ldap_user_member_of = memberOf ldap_user_uid_number = uidNumber ldap_group_nesting_level = 1 ldap_force_upper_case_realm = True ldap_user_principal = userPrincipalName ldap_user_object_class = user ldap_user_gid_number = gidNumber ldap_group_modify_timestamp = whenChanged ldap_group_object_class = group ldap_group_name = cn ldap_user_name = sAMAccountName ldap_ns_account_lock = userAccountControl ldap_user_home_directory = unixHomeDirectory ldap_user_modify_timestamp = whenChanged ldap_group_gid_number = gidNumber ldap_referrals = false ldap_group_nesting_level = 0 Test that groups are working by su’ing to an AD user and typing in “groups”, which will show you what groups your user is a member of. To make the homedirectory autocreate: 1. edit /etc/pam.d/common-session (/etc/pam.d/session-auth in RHEL)and add this line before any pam_ldap or pam_krb5 lines: #autocreate user homedirs session required pam_mkhomedir.so umask=0022 skel=/etc/skel To limit login by AD group:
To allow an AD group to have access to sudo:
%domain\ admins ALL=(ALL) ALL %linux-sudo ALL=(ALL) ALL Further reading: Various bits, mostly to do with LDAP authentication, but can be translated for use with AD/sssd/pam (e.g. homedir creation) http://www.chriscowley.me.uk/blog/2014/06/17/new-linux-active-directory-integration/ http://funwithlinux.net/2014/04/join-ubuntu-14-04-to-active-directory-domain-using-realmd/ http://linux.tvortex.net/2011/10/sssd-against-active-directory-2003.html https://fedorahosted.org/sssd/wiki/Configuring_sssd_with_ad_server Domain Authentication against AD for Cisco and Juniper network devices2014.07.29
On the AD side:
See also http://blog.arwin.me/os/cisco/how-to-setup-cisco-ios-to-authenticate-via-active-directory/ On a Cisco ASA:
On a Cisco switch: This example shows local authentication, which lets you Telnet into the router with username “cisco” and password “cisco.”
In order to test authentication with SSH, you have to add to the previous statements in order to enable SSH.
If you want to prevent non-SSH connections, add the transport input ssh command under the lines to limit the router to SSH connections only.
On a Juniper switch or firewall running JunOS:
The App I Used to Break Into My Neighbor’s Home | Threat Level | WIRED2014.07.25
What I didn’t tell my neighbor was that I spent about 30 seconds in the stairwell scanning his keys with software that would let me reproduce them with no specialized skills whatsoever. The iPhone app I used wasn’t intended for anything so nefarious: KeyMe was designed to let anyone photograph their keys and upload them to the company’s servers. From there, they can be 3-D printed and mail-ordered in a variety of novelty shapes, from a bottle opener to Kanye West’s head. via The App I Used to Break Into My Neighbor’s Home | Threat Level | WIRED. $2,400 “Introduction to Linux” course will be free and online this summer | Ars Technica2014.07.25
The Linux Foundation announced that it would be working with edX, a non-profit online learning site governed by Harvard and MIT, to make its “Introduction to Linux” course free and open to all. The Linux Foundation has long offered a wide variety of training courses through its website, but those can generally cost upwards of $2,000. This introductory class, which usually costs $2,400, will be the first from the Linux Foundation to run as a Massive Open Online Course (MOOC). There is no limit on enrollment through edX’s platform. via $2,400 “Introduction to Linux” course will be free and online this summer | Ars Technica. Google swaps out MySQL, moves to MariaDB • The Register2013.09.25
Google swaps out MySQL, moves to MariaDB ‘They’re moving it all,’ says MariaDB Foundation headman via Google swaps out MySQL, moves to MariaDB • The Register. |
SearchContactTechnical How-ToCategoriesArchivesRecent Posts |
|