irotsoma

joined 3 months ago
[–] irotsoma@lemmy.blahaj.zone 2 points 1 week ago

How do you connect? Is there a domain? Is that domain used for email or any other way that it might circulate?

Also, depends on if the IP address was used for something in the past that was useful to target or not. And finally do you use that IP address outbound a lot, like do you connect to a lot of other services, websites, etc. And finally, does your ISP have geolocation blocks or other filters in place?

It's rare for a process to just scan through all possible IP addresses to find a vulnerable service, there are billions and that would take a very long time. Usually, they use lists of known targets or scan through the addresses owned by certain ISPs. So if you don't have a domain, or that domain is not used for anything else, and you IP address has never gotten on a list in the past, then it's less likely you'll get targeted. But that's no reason to lower your guard. Security through obscurity is only a contributory strategy. Once that obscurity is broken, you're a prime target if anything is vulnerable. New targets get the most attention as they often fix their vulnerabilities once discovered so it has to be used fast, but tend to be the easiest to get lots of goodies out of. Like the person who lives on a side street during trick-or-treat that gives out handfuls of candy to get rid of it fast enough. Once the kids find out, they swarm. Lol

[–] irotsoma@lemmy.blahaj.zone 1 points 2 weeks ago

At work we have 6 environments other than production. At home just one. I created a way to ease deployment of the environment from scratch using a k0sctl config and argocd and the data gets backed up regularly if I need to restore that, too.

[–] irotsoma@lemmy.blahaj.zone 9 points 2 weeks ago

Note that often it's more efficient to move infrequently accessed memory for background tasks to swap rather than having to move that out to swap when something requires the memory causing a delay in loading the application trying to get the RAM, especially on a system with lower total RAM. This is the typical behavior.

However, if you need background tasks to have more priority than foreground tasks, or it truly is a specific application that shouldn't be using swap and should be quickly accessible at all times, or if you need the disk space, then you might benefit from reducing the swap usage. Otherwise, let it swap out and keep memory available.

[–] irotsoma@lemmy.blahaj.zone 5 points 3 weeks ago

This. Get in writing the specific legally binding policies for personal use of their network resources. Not just the personal opinion of the IT people. They don't write the legally binding policy that you are responsible for following.

[–] irotsoma@lemmy.blahaj.zone 1 points 3 weeks ago

I mean, in most cases this isn't criminal law (in the US at least), so it means you have to attract enough attention of a corporation since they're usually the only ones who can afford the legal costs to file the DMCA requests and responses for copyright violation. And with many other civil issues, often corporations with the money for it, don't have standing to sue, and if they did, would be required to sue each individual in the appropriate jurisdiction.

With the removal of Section 230, these costs will go down significantly as a single user's violation could be enough to bankrupt or shut down an entire site of violating content or, if serious criminal violations like child porn, put the person who hosts the site in prison who, will be much easier to identify and sue in a single jurisdiction or arrest than a random internet user.

[–] irotsoma@lemmy.blahaj.zone 1 points 3 weeks ago (2 children)

Yeah, other countries have similar or even more strict requirements, so yeah it all depends on the jurisdiction. You have to also understand that just hosting something externally, doesn't mean you don't fall under laws of another country. It's the internet. And if you live in a country, you may be held responsible for obeying their laws. I'm not a lawyer, so it's something to be careful of even if externally hosted.

[–] irotsoma@lemmy.blahaj.zone 8 points 3 weeks ago (5 children)

This is especially necessary to consider if you live in the US right now. One of the things the current administration is pushing for even harder than past administrations is removal of Section 230 of the communications act that was enacted in the 90s. This provides a defense against liability for the content you host as long as you make a reasonable effort to remove content that is illegal. Problem is that this makes it really difficult to censor (maliciously or otherwise) content because it's hard to go after the poster of the content and easier to go after the host or for the host to be under threat to stop it from being posted in the first place. But it's a totally unreasonable thing, so it basically would mean every website would have to screen every piece of content manually with a legal team and thus would mean user generates content would go away because it would be extremely expensive to implement (to the chagrin of the broadcast content industries).

The DMCA created way for censors to file a complaint and have content taken down immediately before review, but that means the censors have to do a lot of work to implement it, so they've continued to push for total elimination of Section 230. Since it's a problematic thing for fascism, the current administration has also been working hard to build a case so the current biased supreme court can remove it since legislation is unlikely to get through since those people have to get reelected whereas supreme court justices don't care about their reputation.

So, check your local laws and if in the US, keep an eye on Section 230 news as well as making sure you have a proper way to handle DMCA takedown notices.

[–] irotsoma@lemmy.blahaj.zone 6 points 3 weeks ago (1 children)

Are there any guides to using it with reverse proxies like traefik? I've been wanting to try it out but haven't had time to do the research yet.

[–] irotsoma@lemmy.blahaj.zone 8 points 3 weeks ago

Problem is that unless the person was paid for contributing, what goods or services are being exchanged with the project. I mean if Microsoft received money from that person for a subscription or something I might see them having to ban the user and refund the money. But what did the project receive that would violate sanctions? Volunteer work is usually not covered or else relief organizations and religious missionaries would be banned and the US historically loves sending those. What am I missing?

[–] irotsoma@lemmy.blahaj.zone 3 points 4 weeks ago

Yes it's defects in the ingress-nginx controller package.

[–] irotsoma@lemmy.blahaj.zone 1 points 1 month ago

Depends on what you're backing up. Is it configs for applications, images, video, etc? If it's application configs, you can set up those applications in a virtual machine and have a process run that starts the machine, restores the configs, and makes sure the applications start or whatever other tests you want. There are applications for doing that.

If it's images or videos, you can create a script to randomly pick a few, restore them, and check the integrity of the files. Usually just a check of the file header (first few bytes of the file) will tell you if it's an image or video type of file and maybe a check on the file size to make sure it's not an unreasonably small size, like a video that's only 100 bytes or something.

All this seems like overkill though in most scenarios.

[–] irotsoma@lemmy.blahaj.zone 2 points 1 month ago

If you want to keep your LDAP as the source of truth, then Keycloak is also a very good option. I did that originally, but decided I only had a couple of things needing LDAP and that wasn't worth keeping it around. Authentik was a good way to emulate an LDAP but with a different back end. But Keycloak is definitely my recommendation in your case.

view more: next ›