Skip to main content

Posts

2015


Improving LXC template security

··312 words·2 mins
I’ve been getting involved with the Fedora Security Team lately and we’re working as a group to crush security bugs that affect Fedora, CentOS (via EPEL) and Red Hat Enterprise Linux (via EPEL).

Time for a new GPG key

··254 words·2 mins
After an unfortunate death of my Yubikey NEO and a huge mistake on backups, I’ve come to realize that it’s time for a new GPG key.

Chrome 43 stuck in HiDPI mode

··311 words·2 mins
I ran some package updates last night and ended up with a new version of Google Chrome from the stable branch.

Keep old kernels with yum and dnf

··206 words·1 min
When you upgrade packages on Red Hat, CentOS and Fedora systems, the newer package replaces the older package.

Automatic package updates with dnf

··354 words·2 mins
With Fedora 22’s release date quickly approaching, it’s time to familiarize yourself with dnf.

HOWTO: Mikrotik OpenVPN server

··1074 words·6 mins

RB850Gx2 mikrotikMikrotik firewalls have been good to me over the years and they work well for multiple purposes. Creating an OpenVPN server on the device can allow you to connect into your local network when you’re on the road or protect your traffic when you’re using untrusted networks.

Although Miktrotik’s implementation isn’t terribly robust (TCP only, client cert auth is wonky), it works quite well for most users. I’ll walk you through the process from importing certificates through testing it out with a client.

Rackspace::Solve Atlanta Session Recap: “The New Normal”

··577 words·3 mins

This post originally appeared on the Rackspace Blog and I’ve posted it here for readers of this blog. Feel free to send over any comments you have!


solve-logo-1Most IT professionals would agree that 2014 was a long year. Heartbleed, Shellshock, Sandworm and POODLE were just a subset of the vulnerabilities that caused many of us to stay up late and reach for more coffee. As these vulnerabilities became public, I found myself fielding questions from non-technical family members after they watched the CBS Evening News and wondered what was happening. Security is now part of the popular discussion.

Aaron Hackney and I delivered a presentation at Rackspace::Solve Atlanta called “The New Normal” where we armed the audience with security strategies that channel spending to the most effective security improvements. Our approach at Rackspace is simple and balanced: use common sense prevention strategies, invest heavily in detection, and be sure you’re ready to respond when (not if) disaster strikes. We try to help companies prioritize by focusing on a few key areas. Know when there’s a breach. Know what they touched. Know who’s responsible. Below, I’ve included five ways to put this approach into practice.

Run virsh and access libvirt as a regular user

··194 words·1 min

libvirt logoLibvirt is a handy way to manage containers and virtual machines on various systems. On most distributions, you can only access the libvirt daemon via the root user by default. I’d rather use a regular non-root user to access libvirt and limit that access via groups.

Share a wireless connection via ethernet in GNOME 3.14

··368 words·2 mins

There are some situations where you want to do the opposite of creating a wireless hotspot and you want to share a wireless connection to an ethernet connection. For example, if you’re at a hotel that offers only WiFi internet access, you could share that connection to an ethernet switch and plug in more devices. Also, you could get online with your wireless connection and create a small NAT network to test a network device without mangling your home network.

Using play/pause buttons in Chrome with GNOME 3

··160 words·1 min
I wrote a post last summer about preventing Chrome from stealing the media buttons (like play, pause, previous track and next track) from OS X.

Lessons learned from a kernel bisection

··494 words·3 mins
I’m far from being a kernel developer, but I found myself staring down a [peculiar touchpad problem][2] with my new Dell XPS 13.

Using ZoneMinder with a Logitech C270 webcam

··272 words·2 mins
For those of you in the market for a cheap webcam for videoconferencing or home surveillance, the Logitech C270 is hard to beat at about $20-25 USD.

2014


Install sysstat on Fedora 21

··366 words·2 mins
One of the first tools I learned about after working with Red Hat was sysstat.

Send weechat notifications via Pushover

··238 words·2 mins
IRC is my main communication mechanism and I’ve gradually moved from graphical clients, to irssi and then to weechat.

Asus Maximus VI Gene – Error 55

··557 words·3 mins
It’s been quite a while since I built a computer but I decided to give it a try for a new hypervisor/NAS box at home.

Start Jenkins on Fedora 20

··278 words·2 mins
Installing Jenkins on Fedora 20 is quite easy thanks to the available Red Hat packages, but I ran into problems when I tried to start Jenkins.

Unexpected predictable network naming with systemd

··472 words·3 mins
While using a Dell R720 at work today, we stumbled upon a problem where the predictable network device naming with systemd gave us some unpredictable results.

AVC: denied dyntransition from sshd

··163 words·1 min
I’ve been working with some Fedora environments in chroots and I ran into a peculiar SELinux AVC denial a short while ago:

Fixing broken DNS lookups in spamassassin

··311 words·2 mins
I talked about the joys of running my own mail server last week only to find that my mail server was broken yesterday.

Evade the Breach

··831 words·4 mins
This post appeared on the Rackspace Blog last week and I copied it here so that readers of this blog will see it.

Text missing in chrome on Linux

··245 words·2 mins
I’m in the process of trying Fedora 20 on my retina MacBook and I ran into a peculiar issue with Chrome.