Errar es humano. Propagar errores automáticamente es #devops

  • 3 Posts
  • 48 Comments
Joined 1 year ago
cake
Cake day: June 18th, 2023

help-circle









  • Not true.

    The immutability of the thing is just Merkle trees. And integrity of the writings is any form of authorized blocks. From a certificate from an authority a la PKI to proof of work. And anything in between.

    The thing is that there are not too many applications for slow distributed inmutable databases.

    DNS is the only thing that I know that is globally distributed, with slow updates of domains being acceptable.





  • vsis@feddit.cltoPrivacy@lemmy.mlImprove Your Privacy Setup
    link
    fedilink
    English
    arrow-up
    1
    ·
    7 months ago

    If you’re concerned about security, consider GPG signing your kernel with Libreboot GRUB for an additional layer of verification at boot.

    Hey! I had no idea that was possible. I usually encrypt everything but /boot, because it’s easy that way.

    I don’t have a “threat model” of someone puting malware in /boot while I’m away of the computer. But it would be nice to know how to prevent that.

    Do you have a link of a guide or tutorial for that?







  • Some security tips:

    Firewall should block everything by default, and you start allowing incoming and outgoing connections when you need them or if something fails.

    Disable passwords and root access in ssh daemon.

    Use fail2ban or something similar to block bots failing to log-in.

    Use random long passwords for everything (eg: like databases). And put then in a password manager. If you can remember the database password, it’s not strong enough. If you can remember the admin password for a public web service, it’s weak.

    Don’t repeat the passwords. Everything should have its own random long password.

    .env files and files with secrets should be readable only by its service user. Chmod them to 400.

    Monitor logs from time to time to see if something funny is happening.