JustinAngel

joined 1 year ago
[–] [email protected] 5 points 9 months ago (8 children)

Or we fix some shit at home first.

[–] [email protected] 10 points 9 months ago (7 children)

I'm a climate idiot. Does this somehow relate to ice ages, I wonder?

 
 
[–] [email protected] 5 points 9 months ago

this sort of stuff is rampant. A few years old but it makes my blood boil every time I think about it.

Tool Creator should work on this, it ain't making no sense that the default json file (Google) is not updated cause seeing that work on Google tells us that it definitely works on all sites

@drk1wi please resolve google.json file to stop this cookie disabled error

Seems minor but the tone of the demand is wildly entitled.

[–] [email protected] 2 points 10 months ago (1 children)

My claim is that Headscale has a lesser likelihood of compromise than Nextcloud, and that the E2EE provides an encrypted channel between nodes without an immediate need for TLS. Of course TLS over E2EE enhances CIA. There's no pushback to defense in depth here. But in the beginning, the E2EE will get them moving in the right direction.

OP began the post by stating that the login page to a complex PHP web application is internet facing (again, yikes). Given the current implementation, I can only assume that OP is not prepared to deploy a CA, and that the path of least resistance -- and bolstered security -- can be via implementation of HS+TS. They get the benefit of E2EE without the added complexity, for which there is plenty, of a CA until if/when they're ready to take the plunge.

If we're going to take this nonsense all or nothing stance, don't forget to mention that they're doing poorly unless they implement EDR, IDS, TOTP MFA on all services, myriad DNS controls, and full disk encryption. Because those components don't add to the attack surface as well, right?

[–] [email protected] 2 points 10 months ago (3 children)

Tailscale is one of those services..

Tailscale isn't an exposed service. Headscale is, and it isn't connected to the Tailnet. It's a control server used to communicate public keys and connectivity information between nodes. Sure, a threat actor can join nodes to the Tailnet should it become compromised. But have you looked at Headscale's codebase? The attack surface is significantly smaller than anything like OpenVPN.

A cert tells you that you are actually....

I'm all for ssl/tls, but it's more work and may not always be worth the effort depending upon the application, which is exactly why I recommended SmallStep+Caddy. Let's not pretend that introducing things like a CA don't introduce complexity and overhead, even if it's just distributing the root cert to devices.

MITM/DNS Hijack/ARP Poisoning....

Are you suggesting that these attack techniques are effective against zero trust tunnels? Given that the encryption values are sent out of band, via the control channel, how would one intercept and replay the traffic?

[–] [email protected] 4 points 10 months ago (5 children)

Yikes! I'd avoid leaving any services externally exposed unless they're absolutely necessary..

Tailscale+Headscale are pretty easy to implement these days. Since it's effectively zero trust, the tunnels become the encrypted channel so there's an argument that HTTPS isn't really required unless some endpoints won't be accessing services over the Tailnet. SmallStep and Caddy can be used to automatically manage certs if it's needed though.

You can even configure a PiHole (or derivative) to be your DNS server on the VPN, giving you ad blocking on the go.

[–] [email protected] 2 points 10 months ago

Anecdotal, but Ive had a container running Nextcloud in an LXC on Proxmox along with PiHole, Step CA, Bacula, and quite a few other services and I've had zero downtime since June 2023. Even have Tailscale rigged to use PiHole as the tailnet DNS to have adblocking on the go.

Guess that restart: always value in the Compose config is pulling it's weight lol

[–] [email protected] 9 points 10 months ago

The TrueType vulnerability they patched in January 2023 without notifying the public of active exploitation, leaving Kaspersky to discover it while responding to security incidents.

[–] [email protected] 14 points 10 months ago (2 children)

VIM Golf.... Same outcome, fewer strokes:

%d|wq

[–] [email protected] 14 points 10 months ago

Is this like door dash for saddies?

[–] [email protected] 30 points 10 months ago

"Over 50 per cent of heroin addicts will stop using by 2025 as negative, obvious consequences grow"

[–] [email protected] 23 points 10 months ago (2 children)

Pretty much anything that takes followers away from the church is likely to be labeled evil.

view more: next ›