• 0 Posts
  • 123 Comments
Joined 2 years ago
cake
Cake day: June 23rd, 2023

help-circle

  • I had a few AC Pros in a 110+ year old house where other AP’s had issues with all the plaster & lathe walls. They worked great. I also have a couple of them installed at a non-profit org I volunteer with and everybody is very happy with how they work there as well.

    After moving from that first house to a new one with a bigger footprint I upgraded to a pair of their U6 mesh AP’s, one at each end of the house. Never had any issues with them.



  • I recall seeing videos posted to Reddit and other social media from a number of years ago. An alleged child rapist (murderer?) was handcuffed and being escorted through the airport by police, with TV camera crews following along. The father of the victim was waiting at a bank of pay phones, as if he was using one. As the group walked by, the father walked towards them, shot and killed the man, and immediately surrendered to the police.

    Although it seemed like a clear cut case of premeditated murder I recall he got off with a very minimal sentence. If this guy is caught and tried then I really hope for a similar outcome.


  • Until the bills for running those servers start piling up. Most/all those companies are headquartered in the US, and it likely wouldn’t be trivial for employees in other countries to suddenly start accessing finances etc. if the US offices are unexpectedly shuttered.

    There’s also a huge knowledge drain that could impact the operation of those servers. I work on a devops team that manages web services serving around 15 countries. All but one of my teammates are in the US. We occasionally have to deal with hardware failures in our AWS cloud environments that requires manual intervention to recover from, for example. If that sort of knowledge is lost, or even severely limited, then it can easily lead to cascading failures that makes a site completely inaccessible.







  • My employer had an EV cert for years on our primary domain. The C-suites, etc. thought it was important. Then one of our engineers who focuses on SEO demonstrated how the EV cert slowed down page loads enough that search engines like Google might take notice. Apparently EV certs trigger an additional lookup by the browser to confirm the extended validity.

    Once the powers-that-be understood that the EV cert wasn’t offering any additional usefulness, and might be impacting our SEO performance (however small) they had us get rid of it and use a good old OV cert instead.




  • Port 22 is the default SSH port and it receives a TON of malicious traffic any time it’s open to the whole internet. 20 years ago I saw a newly installed server with a weak root password get infected by an IP address in China less than an hour after being connected to the open internet.

    With all the bots out there these days it would probably take a lot less time if we ran the same experiment again.


  • Depends on the content. My employers sites are a good mix of images, static, and dynamic content, and we rely heavily on Akamai. Their caching of our images offloads a huge amount of work from our origins. We also use their Image Manager tool to optimize a lot of the images seamlessly, which adds further optimization. Their WAF and other security tools are also very impressive.




  • Our web servers are locked down in such a way that you can’t copy data off of them using standard protocols like scp, ftp, and even http, etc. Our firewall blocks all such outbound traffic.

    This hacker found a bug in a framework used on our web servers that let him execute commands remotely. When commands to copy data off the server failed using those more typical methods he switched to a more novel (and difficult) method of leveraging DNS instead. He discovered we weren’t locking DNS down the same way we were locking other protocols down and used that as a way to extract data from our server.


  • I never would have thought of it but I recently saw a novel use of DNS to exfiltrate data from a compromised server.

    My employer takes security very seriously. Our public facing web servers are very thoroughly locked down, or so we thought. We contract with companies like HackerOne to perform penetration testing etc. One of their white hat hackers managed a remote command attack, and copied data off of the server via a string of DNS queries.

    Suppose the hacker owned the domain example.com, and he had his own authoritative nameserver for it. He just ran a series of commands that took, for example, a password file, and ran DNS queries for line1.example.com, line2.example.com, line3.example.com and so on for each line in the file. As a result the log file on his DNS server collected each line of the password file as it responded to each query.