|
You are here |
nevesnunes.github.io | ||
| | | | |
www.agwa.name
|
|
| | | | | ||
| | | | |
lwn.net
|
|
| | | | | [AI summary] An article details a denial-of-service attack where malicious actors flooded OpenPGP public keys with thousands of bogus certificates, causing performance failures in GnuPG and highlighting the maintenance issues of the aging SKS key server network. | |
| | | | |
zacbrown.org
|
|
| | | | | Zac Brown's Nonsense is the source for all of Zac Brown's nonsense. If it's Zac Brown related, then it's probably nonsense. And if it's nonsense, then it's probably here! | |
| | | | |
www.sudo.ws
|
|
| | | Using sudo_logsrvd to centrally collect sudo session recordings from your network is a huge step forward in security: users cannot delete or modify session recordings locally. However, by default, transmission of recordings is not encrypted, making it open to modifications and eavesdropping. Encrypting the connection between sudo and sudo_logsrvd can eliminate these problems. Larger environments usually either have in-house PKI tooling in place, or colleagues who know all openssl options off the top of their heads. However, small and medium enterprises often lack the infrastructure or knowledge to work with TLS certificates. | ||