Monthly Shaarli

All links of one month in a single page.

August, 2021

Tools to manipulate CSV files from the Command Line
Podman 3.3
thumbnail
DebConf21 Recordings
Video: Joscha Bach: Nature of Reality, Dreams, and Consciousness | Lex Fridman Podcast
thumbnail
Five Ansible Techniques I Wish I’d Known Earlier
thumbnail
Linux Kernel Defence Map
thumbnail
Here’s Another Free CA as an Alternative to Let’s Encrypt
thumbnail
Raspberry Pi 4 gets IEEE1588 Precision Time Protocol (PTP) with Real-Time HAT
ntopng 5.0
thumbnail
How Does FaceTime Work?

Based on facts and assumptions, this article summarizes how Apple's proprietary videotelephony protocol might work.

Twitter has introduced ROA
thumbnail

This post introduces Route Origin Authorization (ROA) and the implication of its usage for Twitter.

Email Authenticity 101: DKIM, DMARC, and SPF

In this post, the author gives a short introduction to modern email domain security concepts.

Sustainable Web Design
Debian Pure Blends

Debian Pure Blends are a solution for groups of people with specific needs.

Root Cause of Failure, Root Cause of Success
thumbnail

Blog post on why there is no such thing as a "root cause" in the context of complex systems failure.

EC2 Boot-Time Benchmarking

Colin Percival compares boot times of different operating systems on EC2 with his tool ec2-boot-bench.

SSH Tunnels
thumbnail

In this video, the speaker gives a practical introduction to SSH tunnels with lots of examples and configuration tips.

Build Your Own NeXT With a Virtual Machine
thumbnail
Weaponizing Middleboxes for TCP Reflected Amplification

This post explains how attackers can abuse middleboxes and censorship infrastructure for DoS amplification attacks over TCP.

ssh-tools
thumbnail

Set of helpful SSH tools.

The Open-Source Movement Comes to Medical Datasets
thumbnail
Linux Kernel Security Done Right
thumbnail

Suggests for improving Linux Kernel security, e.g. by converting redundant downstream kernel bug-fixing by vendors into greater upstream collaboration.

curlie
thumbnail

»If you like the interface of HTTPie but miss the features of curl, curlie is what you are searching for.«

Grml 2021.07

Version 2021.07 of the Debian-based live system, primarily targeted at system administrators, was released.

You Really Shouldn't Roll Your Own Crypto

An empirical study of vulnerabilities in cryptographic libraries.

Sysadmins: Why Not Simply Verify There's No Backdoor in Every Program You Install, and Thus Avoid Any Cyber-Drama?
thumbnail

In this article, Gareth Corfield comments on ENISA's supply chain attack report.

From Stolen Laptop to Inside the Company Network

Even a laptop following security best practices does not keep attackers from exploiting it. In this case, a TPM secured, FDE SSD was targeted.

Uptime Kuma
thumbnail
QEMU 6.1.0
Pi-KVM
thumbnail
HTTP/2 in Infrastructure: Ambry Network Stack Refactoring
thumbnail

This post shows how HTTP/2 solved bottlenecks between frontend and storage nodes in LinkedIn's distributed object-store.

Survey: 1 in 4 Facility Managers Experienced OT System Breaches

»A survey commissioned by industrial giant Honeywell showed that roughly a quarter of facility managers have admitted suffering a breach of operational technology (OT) systems in the past year.«

HTML over DNS: Serving Blog Content Over DNS
Transport Layer Security (TLS) Parameters
Barrier
thumbnail

»Barrier is software that mimics the functionality of a KVM switch«

PAM Duress
thumbnail

The PAM Duress is a module designed to allow users to generate 'duress' passwords that will execute arbitrary scripts when used in place of their regular password.

An Opinionated Guide to xargs
Explore New Features in SystemTap 4.5.0
thumbnail

This article covers new features of the SystemTap version that will be available in RHEL 9.

Stop Using Zoom, Hamburg's DPA Warns State Government
thumbnail

»Hamburg's state government has been formally warned against using Zoom over data protection concerns.«

Debian 11

Debian 11 is out, some of the changes: systemd now defaults to using cgroupv2, the systemd journal is now persisted by default. Debian 11 includes over 11294 new packages, and the maintainers updated most of the existing ones. Version numbers of some well-known packages:

  • PostgreSQL 13
  • Samba 4.13
  • Vim 8.2
  • OpenSSH 8.4p1
  • Nginx 1.18
  • KDE Plasma 5.20
eBPF Foundation
thumbnail

Facebook, Google, Isovalent, Microsoft, and Netflix launch eBPF Foundation as Part of the Linux Foundation.

Open-Sourcing a More Precise Time Appliance
thumbnail

This blog post introduces Facebook's Open Compute Time Appliance, based on the PCIe Time Card.

HTTP/3 From A To Z: Core Concepts (Part 1)
thumbnail
Operating Systems

Timeline containing over 830 operating systems.

xpra
thumbnail
Red Hat OpenShift 4.8
thumbnail

OpenShift 4.8 brings, among other improvements, an additional OCI-compliant runtime based on Kata Containers, NVIDIA multi-instance GPU, OpenShift Pipelines, IPv6 support, and serverless functions as a technology preview.

The Apple PSI System

Paper about the cryptography and security analysis behind the Apple PSI system.

The Linux Command Line
ipv6.watch
Refined Blog

List of personal blogs focusing on software.

Calamares
thumbnail

Distribution-independent installer framework.

FreeBSD Status Report Q2 2021

Amongst other news, the report for Q2 contains information on:

  • A new, web-based installer.
  • LLDB Debugger Improvements.
  • Update of the Linux compatibility layer.
  • pf syncookie support.
  • The RAIDZ expansion update
  • helloSystem
IBM's z/OS Update for Mainframes About to Land
thumbnail

This article summarizes the information on the upcoming z/OS 2.5 release.

Netcat - All You Need to Know
thumbnail
Mobile Device Best Practices
Where Text Protocols Came From, and Why They're Not Going Anywhere
thumbnail

In this post, the author shows that even if not always the most efficient solution, there still are use-cases where human-readable protocols shine.

h2c - Headers to curl
CRI-O 1.22
thumbnail
Turing Pi 2
thumbnail
macOS 11’s Hidden Security Improvements
thumbnail
Latency Sneaks Up On You

The author explains why high-percentile latency is not a good way to measure efficiency.

Asking Nicely for Root Command Execution (And Getting It)

»Suffice it to say, if you work someplace with enough machines, there's probably some way for you to get root on all of them if you can hit them with a handful of packets. I've seen it happen far too many times at enough companies to expect things to stay secure. I'm not talking about buffer overflows and stuff like that, although those exist too. I mean just straight up asking a service to please run a command for you (as root), and it gladly complies.«

Windows File System Proxy
thumbnail

»WinFsp is a set of software components for Windows computers that allows the creation of user mode file systems. In this sense it is similar to FUSE (Filesystem in Userspace), which provides the same functionality on UNIX-like computers.«

nftables 1.0.0
Git 2.33
OpenSSH 8.7

Besides other improvements and bug fixes, this release adds SFTP support for SCP as an eventual replacement to the SCP/RCP protocol and stricter configuration file parser for ssh and sshd.

What Domain Name to Use for Your Home Network
thumbnail

RFC 8375 defines the special-purpose TLD home.arpa.

20 Years of Haiku

The Haiku Project, originally named OpenBeOS, was founded in August 2001.

OSADL

OSADL (Open Source Automation Development Lab): Open Source Software for Automation and Other Industries.

observatory-cli
thumbnail

observatory-cli is the command-line version of Mozilla's Observatory, »a project designed to help developers, system administrators, and security professionals configure their sites safely and securely.«

Migrating PostgreSQL to Kubernetes
thumbnail

Blog post on migrating on-prem Postgres to a GKE cluster with Percona Operator.

Glowworm Attack
thumbnail

Glowworm Attack: recovering sound by analyzing optical emanations from a device's power indicator LED.

This Is Why Valve Is Switching From Debian to Arch for Steam Deck's Linux OS
thumbnail

This post explains the rationale behind the decision to switch from Debian to Arch Linux for SteamOS 3.0.

OpenBSD Router Guide
WireGuardNT

The Windows kernel native port of WireGuard was announced.

Cockpit 250

Cockpit 250 comes with basic kpatch support, an improved admin switcher, and VM migration.

Apache Cassandra

Some of the new features are support for Java 11, Virtual Tables, Audit logging, and full query logging.

HTTP/2: The Sequel is Always Worse
thumbnail

This blog post investigates HTTP/2 implementation issues and some of the resulting security implications.

Kubernetes Hardening Guidance

Kubernetes hardening guide by the NSA and CISA.

The Logic Behind Three Random Words
thumbnail

This blog post gives background information on the three random words password creation advice.

Szyszka
thumbnail

»Szyszka is a simple but powerful and fast bulk file renamer.«

5000x faster CRDTs: An Adventure in Optimization

The author explains how he optimized the performance of conflict-free replicated data types.

ENISA Telecom Security Incidents 2020 - Annual Report

Of the 170 registered incidents in 2020, 50 % were caused by system failures, 40 % by human errors, 7 % by natural phenomena, and 2 % by malicious actions.

Top Routinely Exploited Vulnerabilities

»Four of the most targeted vulnerabilities in 2020 affected remote work, VPNs, or cloud-based technologies.«

Kernel Pwning with eBPF: A Love Story

This blog post provides the reader with an in-depth look at eBPF and its security implications in general and details of the specific bug CVE-2021-3490.

The Cost of Cloud, a Trillion Dollar Paradox
thumbnail

»You're crazy if you don't start in the cloud; you're crazy if you stay on it.«