[ / / / / / / / / / / / / / ] [ dir / animu / bestemma / cafechan / clang / doomer / mde / rtd / vg ][Options][ watchlist ]

/tech/ - Technology

You can now write text to your AI-generated image at https://aiproto.com It is currently free to use for Proto members.
Email
Comment *
File
Select/drop/paste files here
Password (Randomized for file and post deletion; you may also set your own.)
* = required field[▶ Show post options & limits]
Confused? See the FAQ.
Expand all images

File (hide): a1477b23584575f⋯.png (514.44 KB, 862x839, 862:839, 1542563807091.png) (h) (u)

[–]

 No.1019041>>1019090 [Watch Thread][Show All Posts]

Hey 8ch fix your shit edition

http://mail.8ch.net/

https://censys.io/ipv4/206.223.147.150

https://www.exploit-db.com/exploits/40892

https://www.exploit-db.com/exploits/45001

Send me btc: 1H93s5UVviVHWJXtE3P2mq9WGM6agek2L9

ALSO security general:

Anything sec related::

 No.1019046


 No.1019048

Server

nginx 1.11.3

Server

OpenSSH 6.6.1


 No.1019090>>1019575 >>1019603

>>1019041 (OP)

>exposing admin-only services to the internet, not using tinc/cjdns/VPN in order to make a private network in which such services may reside.

What


 No.1019309

daily reminder


 No.1019575

File (hide): 2e86319d0604076⋯.jpg (144.14 KB, 1280x718, 640:359, 1391804369176.jpg) (h) (u)

>>1019090

>tinc/cjdns/VPN

Do you just spew buzzwords without thinking?

1) tinc is VPN software. With outdated crypto and 'easy to start' as only benefit.

2) using cjdns is security through obscurity, extra set of things to break and security holes, and no better than having bastion host for solving 'SSH listens on well known IP' problem

3) 99% of hosting services provide non-internet routable network for your hosts. No need to bring your own vpn.

So, textbook setup is:

- Web server host - has both public IP and connected to internal net. SSH listens only to local interface.

- Databases, whenever extra shit you need - connected only to internal network.

- Bastion - both public and internal connections, SSH listens to public. Keep IP confidential, and use non-standard ssh port (yes, it's obscurity, but extra layer for epsilon effort. Will also keep your logs clean from botnets' junk).

Internal network firewall should be run on router, to protect against local root on compromised webserver. Allow web -> databases; bastion -> anywhere (ssh port only); block anything else.

Public firewall config is obvious, and it's ok to run it on hosts themselves.

Once you are comfortable with basic networking, you can try to setting up proper DMZ and VPN (but both are not overkill for basic website case).


 No.1019603>>1019606

>>1019090

Isn't IPv6 (which we're doomed to eventually) all about exposing everything (including the MAC address which is part of the IPv6 address with EUI-64) to the public internet by default?


 No.1019606

>>1019603

No, there are still private addresses with IPv6 (you just don't need to use them). The security of NAT was a by-product of trying to extend IPv4, not the goal.




[Return][Go to top][Catalog][Screencap][Nerve Center][Cancer][Update] ( Scroll to new posts) ( Auto) 5
7 replies | 1 images | Page ?
[Post a Reply]
[ / / / / / / / / / / / / / ] [ dir / animu / bestemma / cafechan / clang / doomer / mde / rtd / vg ][ watchlist ]