Skip to main content

Oldposts

2017


RHEL 7 STIG v1 updates for openstack-ansible-security

·204 words·1 min
DISA’s final release of the Red Hat Enterprise Linux (RHEL) 7 Security Technical Implementation Guide (STIG) came out a few weeks ago and it has plenty of improvements and changes.

Takeaways from Bruce Schneier’s talk: “Security and Privacy in a Hyper-connected World”

·840 words·4 mins

IBM Interconnect 2017 Bruce SchneierBruce Schneier is one of my favorite speakers when it comes to the topic of all things security. His talk from IBM Interconnect 2017, “Security and Privacy in a Hyper-connected World”1, covered a wide range of security concerns.

There were plenty of great quotes from the talk (scroll to the end for those) and I will summarize the main takeaways in this post.

People, process, and technology #

Bruce hits this topic a lot and for good reason: a weak link in any of the three could lead to a breach and a loss of data. He talked about the concept of security as a product and a process. Security is part of every product we consume. Whether it’s the safety of the food that makes it into our homes or the new internet-connected thermostat on the wall, security is part of the product.

The companies that sell these products have a wide variety of strategies for managing security issues. Vulnerabilities in an internet-connected teapot are not worth much since there isn’t a lot of value there. It’s probably safe to assume that a teapot will have many more vulnerabilities than your average Apple or Android mobile device. Vulnerabilities in those devices are extremely valuable because the data we carry on those devices is valuable.

Certainty vs. uncertainty #

The talk moved into incident response and how to be successful when the worst happens. Automation only works when there’s a high degree of certainty in the situation. If there are variables that can be plugged into an algorithm and a result comes out the other end, automation is fantastic.

Bruce recommended using orchestration when tackling uncertain situations, such as security incident responses. Orchestration involves people following processes and using technology where it makes sense.

He talked about going through TSA checkpoints where metal detectors and x-ray scanners essentially run the show. Humans are around when these pieces of technology detect a problem. If you put a weapon into your carry on, the x-ray scanner will notify a human and that human can take an appropriate response to escalate the problem. If a regular passenger has a firearm in a carry-on bag, the police should be alerted. If an Air Marshal has one, then the situation is handled entirely differently - by a human.

One other aspect he noted was around the uncertainty surrounding our data. Our control over our data, and our control over the systems that hold our data, is decreasing. Bruce remarked that he has more control over what his laptop does than his thermostat.

OODA loop #

Bruce raised awareness around the OODA loop and its value when dealing with security incidents. Savvy readers will remember that the OODA loop was the crux of my “Be an inspiration, not an impostor” talk about impostor syndrome.

His point was that the OODA loop is a great way to structure a response during a stressful situation. When the orchestration works well, the defenders can complete an OODA loop faster than their adversaries can. When it works really well, the defenders can find ways to disrupt the adversaries’ OODA loops and thwart the attack.

Five reasons why I’m excited about POWER9

·429 words·3 mins
There’s plenty to like about the POWER8 architecture: high speed interconnections, large (and flexible) core counts, and support for lots of memory.

2016


Power 8 to the people

·1000 words·5 mins
IBM Edge 2016 is almost over and I’ve learned a lot about Power 8 this week.

IBM Edge 2016: Day 2 Recap

·647 words·4 mins
Day two of IBM Edge 2016 is all done, and the focus has shifted to the individual.

IBM Edge 2016: Day 1 Recap

·905 words·5 mins
I am here in Las Vegas for IBM Edge 2016 to learn about the latest developments in POWER, machine learning, and OpenStack.

Getting ready for IBM Edge 2016

·181 words·1 min
IBM Edge 2016 starts next week in Las Vegas with an emphasis on changing how we think about technology.

New SELinux shirts are available

·74 words·1 min
With the upcoming Red Hat Summit 2016 in San Francisco almost upon us, I decided to update the old SELinux shirts with two new designs:

Getting started with gertty

·438 words·3 mins
When you’re ready to commit code in an OpenStack project, your patch will eventually land in a Gerrit queue for review.

Recovering deleted Chrome bookmarks on Linux

·85 words·1 min
After getting a bit overzealous with cleaning up bookmarks in Chrome, I discovered that I deleted a helpful Gerrit filter for OpenStack reviews.

Fight cynicism with curiosity

·780 words·4 mins
I’m always interested to talk to college students about technology and business in general.

2015


supernova 2.2.0 is available

·156 words·1 min
Thanks to all of the contributors that helped make a new release of supernova possible!

GRE tunnels with systemd-networkd

·874 words·5 mins
Switching to systemd-networkd for managing your networking interfaces makes things quite a bit simpler over standard networking scripts or NetworkManager.

Understanding systemd’s predictable network device names

·1319 words·7 mins
I talked a bit about systemd’s network device name in my earlier post about systemd-networkd and bonding and I received some questions about how systemd rolls through the possible names of network devices to choose the final name.

Fedora Flock 2015: Keynote slides

·85 words·1 min
Fedora Flock 2015 is still going here in Rochester, New York, and I kicked off our second day with a keynote talk about overcoming impostor syndrome.

Very slow ssh logins on Fedora 22

·170 words·1 min
I’ve recently set up a Fedora 22 firewall/router at home (more on that later) and I noticed that remote ssh logins were extremely slow.

Book Review: Linux Kernel Development

·764 words·4 mins
I picked up a copy of Robert Love’s book, Linux Kernel Development, earlier this year and I’ve worked my way through it over the past several weeks.

Improving LXC template security

·312 words·2 mins
I’ve been getting involved with the Fedora Security Team lately and we’re working as a group to crush security bugs that affect Fedora, CentOS (via EPEL) and Red Hat Enterprise Linux (via EPEL).

Time for a new GPG key

·257 words·2 mins
After an unfortunate death of my Yubikey NEO and a huge mistake on backups, I’ve come to realize that it’s time for a new GPG key.

Chrome 43 stuck in HiDPI mode

·313 words·2 mins
I ran some package updates last night and ended up with a new version of Google Chrome from the stable branch.

Upatre and icanhazip

·240 words·2 mins
I recently updated the icanhazip FAQ about the resurgence of the Upatre malware and how it’s abusing icanhazip.

Keep old kernels with yum and dnf

·206 words·1 min
When you upgrade packages on Red Hat, CentOS and Fedora systems, the newer package replaces the older package.

HOWTO: Mikrotik OpenVPN server

·1081 words·6 mins

RB850Gx2 mikrotikMikrotik firewalls have been good to me over the years and they work well for multiple purposes. Creating an OpenVPN server on the device can allow you to connect into your local network when you’re on the road or protect your traffic when you’re using untrusted networks.

Although Miktrotik’s implementation isn’t terribly robust (TCP only, client cert auth is wonky), it works quite well for most users. I’ll walk you through the process from importing certificates through testing it out with a client.

Rackspace::Solve Atlanta Session Recap: “The New Normal”

·577 words·3 mins

This post originally appeared on the Rackspace Blog and I’ve posted it here for readers of this blog. Feel free to send over any comments you have!


solve-logo-1Most IT professionals would agree that 2014 was a long year. Heartbleed, Shellshock, Sandworm and POODLE were just a subset of the vulnerabilities that caused many of us to stay up late and reach for more coffee. As these vulnerabilities became public, I found myself fielding questions from non-technical family members after they watched the CBS Evening News and wondered what was happening. Security is now part of the popular discussion.

Aaron Hackney and I delivered a presentation at Rackspace::Solve Atlanta called “The New Normal” where we armed the audience with security strategies that channel spending to the most effective security improvements. Our approach at Rackspace is simple and balanced: use common sense prevention strategies, invest heavily in detection, and be sure you’re ready to respond when (not if) disaster strikes. We try to help companies prioritize by focusing on a few key areas. Know when there’s a breach. Know what they touched. Know who’s responsible. Below, I’ve included five ways to put this approach into practice.

Woot! Eight years of my blog

·688 words·4 mins

The spring of 2015 marks eight years of this blog! I’ve learned plenty of tough lessons along the way and I’ve made some changes recently that might be handy for other people. After watching Sasha Laundy’s video from her awesome talk at Pycon 20151, I’m even more energized to share what I’ve learned with other people. (Seriously: Go watch that video or review the slides whether you work in IT or not. It’s worth your time.)

Let’s start from the beginning.

Run virsh and access libvirt as a regular user

·194 words·1 min

libvirt logoLibvirt is a handy way to manage containers and virtual machines on various systems. On most distributions, you can only access the libvirt daemon via the root user by default. I’d rather use a regular non-root user to access libvirt and limit that access via groups.