redfox

joined 1 year ago
[–] redfox@infosec.pub 2 points 3 weeks ago
[–] redfox@infosec.pub 1 points 3 weeks ago

If you want to go balls out, go get DISA stigg for Redhat.

[–] redfox@infosec.pub 1 points 3 weeks ago

Is this a terms of service violation in most places? Seems like a childish waste of time, but I guess not surprising.

[–] redfox@infosec.pub 2 points 4 weeks ago* (last edited 4 weeks ago) (1 children)

I would like for some of the prominent church leaders to speak about that. Even if they don't publicly contest it, though that should be considered, they could at least speak to congregations about it.

Coincidentally, one of, or the (I don't know) paster for the North view church gave a somewhat similar message along with the typical hope in Jesus Easter message.

He played that news caster who was ranting about "I don't care about your Christian religion". Maybe I can edit with a link, but my favorite part was the paster expression agreement with her. She was loud and angry, but there must be a reason or a very bad experience with people claiming the name, but I agree with her.

All this seems too similar to the religious freedom act that felt more like bigotry than freedom. I'm a pretty garbage or luke warm follower, but I detest bigotry under the banner of the church. I still believe that the two are not the same thing when done correctly.

Also, thanks for the actual references and apparent understanding, rather than just unbridled hate.

Edit, video was Ana Kasparian. I think it was largely about abortion, but still relevant.

[–] redfox@infosec.pub 3 points 1 month ago* (last edited 1 month ago) (3 children)

I actually appreciate these verses regardless of intentions, because I agree completely with the implied point.

In the new testament, God was only hard on the religious elite, who always missed the point. He cut everyone else a lot of slack.

The idea that government should hold citizens to the same standards as a religion they don't believe in seems insane, and also runs contrary to Jesus teaching or actual Christianity.

[–] redfox@infosec.pub 1 points 1 month ago

Knowledge primarily, since I'm not running a business.

At this point, like they say in Chips, TLS inspection is standard...

If your enterprise isn't doing TLS inspection on everything other than banks, medical, gov, they're doing it wrong.

Some times people think the hard part is getting the CA trust setup, but I find it's far more tedious to deal with certain sites and mobile apps especially that do certificate pinning.

[–] redfox@infosec.pub -1 points 1 month ago (2 children)

I like OPN also. I've always appreciated the stability of the BSDs.

My only personal complaint with OPN/PF was the TLS inspection.

I've read about adding the modules to *Sense, but I haven't figured out the configuration pieces.

It just works with Sophos UTM and XG firewall, and the configuration was super easy.

You always use what you like though.

[–] redfox@infosec.pub 0 points 1 month ago

This is true, the 6 GB RAM limit and four cores.

I run a pretty enterprise home lab, and I haven't ever seen the devices hit the resource limit.

I have around 3k IPS rules and TLS inspection for most categories of sites except the normal stuff like streaming, banking, etc that you'd not want or need to inspect.

For anyone it might help, I use these as inline proxies rather than as the gateway at the moment. So they have more than just internet traffic going through them, they also have segments of my LANs getting evaluated. Performance has been great so far.

 

Public Service Announcement:

Have you checked out Sophos XG Firewall for home use lately?

It's basically an enterprise firewall fully licensed for personal use.

  • All the firewall stuff
  • Normal IPS
  • Built-In easy transparent SSL/TLS proxy
  • Web Application Firewall

I like it better than PF/Open Sense right now.

https://youtu.be/Ui8UC8-MeJU

[–] redfox@infosec.pub 1 points 1 month ago

Chris Rock said this best during a bit from the 90s talking about OJ Simpson:

"I'm not saying he should have done it....but I understand"

[–] redfox@infosec.pub 2 points 1 month ago (1 children)

Should we be discouraged or appreciative of the shit show that is the current and near term state of information technology and security?

On one hand, there's never been more need for doing IT well, more informal computer based warfare, and an enormous plethora of companies trying to innovation or enshitificate security solutions....

On the other hand there's all that above.

You'd think job security, but still not quite.

I see security people grinding and burning out, not sure if that's fixable. Maybe if you change from caring to not caring?

Thoughts?

[–] redfox@infosec.pub 18 points 1 month ago* (last edited 1 month ago) (3 children)

hates him and sabotages him at every step

Isn't that also describing his children?

[–] redfox@infosec.pub 2 points 2 months ago

Lol, funny because true. We are all so angry about the exploitation.

12
submitted 2 months ago* (last edited 1 month ago) by redfox@infosec.pub to c/indiana@midwest.social
 

If I understand this article correctly, instead of working out of the Governor's mansion, which is already maintained by our tax money, and is close to the offices Braun is forcing everyone back into, let's put a pin in that, and it already has quarters for state police details...

he's spending more of our tax money on his private residence, planning to work from home, and wants to get flown in a fucking helicopter?

Couple things:

  • helicopters cost 2-4 thousand dollars per flight hour depending on aircraft

  • He made everyone return to offices

  • Some offices or rented floors in the downtown Sheridan cost about a million per year to rent (I need to fact check this, I just heard from an insider)

Am I misunderstanding wats going and I'm at fault for thinking he's a huge fucking douche bag and hypocrite?

I know this place is a bit of an echo chamber not favoring republican politics, but this seems more bipartisan and plainly fucking stupid?

 

I consider myself slightly in a conservative, Christian viewpoint camp. I say slightly because as I get past middle age, all those views or opinions have shifted.

I'm not a huge fan of abortion, but my opinion is slightly more nuanced and that's not a topic I think will be fruitfully discussed online.

Button line, seeing things like this however make me slightly lose my fucking mind.

Insert huge rant here about hypocrisy and unreasonable people, laced with outrage and much profanity.

I know others in my circle who also feel similarly. My hope is that people might know even church going conservative people think this is fucking bullshit and that piece of shit attorney general need to go. Fuck him.

22
submitted 7 months ago* (last edited 7 months ago) by redfox@infosec.pub to c/technology@lemmy.world
 

After reading this article, I had a few dissenting thoughts, maybe someone will provide their perspective?

The article suggests not running critical workloads virtually based on a failure scenario of the hosting environment (such as ransomware on hypervisor).

That does allow using the 'all your eggs in one basket' phrase, so I agree that running at least one instance of a service physically could be justified, but threat actors will be trying to time execution of attacks against both if possible. Adding complexity works both ways here.

I don't really agree with the comments about not patching however. The premise that the physical workload or instance would be patched or updated more than the virtual one seems unrelated. A hesitance to patch systems is more about up time vs downtime vs breaking vs risk in my opinion.

Is your organization running critical workloads virtual like anything else, combination physical and virtual, or combination of all previous plus cloud solutions (off prem)?

 

I've seen companies do all sorts of home grown things.

One uses a spreadsheet that is just the configuration row by row, they turn it I to text file and copy to startup, reload.

I have used git servers to do the same thing, but with obvious change tracking history of git.

What real or home grown things are you using?

 

Currently using an ISR4461x. Now 17.7+ supports ssl VPN.

Should we learn flexvpn or do ssl VPN?

3
submitted 1 year ago* (last edited 1 year ago) by redfox@infosec.pub to c/cybersecurity@infosec.pub
 

This is a network defense design scheme question.

In a scenario where your organization is designing multi-layered firewall deployment and management, how granular  do you create rules at each of these three layers?

Example site is a main/HQ site that also houses your data center (basic 3 tier model).

  1. Site has your main internet gateway and VPN termination point. As am example, it's a Cisco or other ZBF. It has four zones: (1) Internet, (2) VPNs from other sites/clients, (3) your corporate LAN including data center, (4) Guest/untrusted/Iot.

  2. Between your gateway and the rest of your corporate network/datacenter, you have transparent proxy firewall/IPS/monitor. It's bridging traffic between gateway and data center.

  3. Within data center, hosts have software host based firewalls, all centrally managed by management product.

Questions:

  • How granular do you make ZBF policies at gateway? Limit it to broad zones, subnets, etc? Get granular by source/destination? Further granular by source/destination/port?

  • How granular do you make rules for transparent proxies between segments? Src/dst? Src/dst/port?

  • How granular do you make rules for host based firewalls? Src/dst? Src/dst/port? Src/dst/port/application/executable?

  • How have organizations you've worked for implemented these strategies?

  • Were they manageable vs effective?

  • Did the organization detect/prevent lateral movement if any unauthorized access happened?

  • What would you change about your organization's firewall related designs?

 

What sources of technical controls does your organization use?

Do you base device/operating system configurations on:

  • CIS workbench?
  • NIST/STIG?
  • Microsoft best practice?
  • Google searches and 'that looks good'?

How closely rigorously does your organization enforce change management for policies or settings?

  • Can you change GPOs/Linux/Network device settings as needed?
  • During maintenance window?
  • After a group meeting with code/change review and some sort of approval authority?
 

Does anyone fully implement workstation and server logon restrictions, and priviledged access workstations (PAW) as prescribed by NIST/STIG/CIS?

The URL is Microsoft's long description of the same concepts.

Specifically from the above, there's a few things like:

  • Establishing asset/systems tiers (domain controllers or entire org compromise tier 0, moving towards less consequence in the event of system compromise)
  • Accounts with the Active Directory Domain Admins or equivalent are supposed to be blocked from logging into lower tier assets
  • Workstations that have access to log into these super sensitive assets like Domain controllers for management are considered PAWs, and are blocked from internet access, highly locked down, might have extra hoops or management plane assets are air gapped?

Question:

Does anyone actually do any of this at their organization?

If so, to what degree?

People hated red forest because it was a whole other set of infrastructure to baby sit.

People hate air gapped systems because no remote access or work from home.

The above doesn't work well with cloud, and as a result Microsoft (just as an example) pushed for the new hybrid PIM models replacing their old red forest concept.

I'm just curious.

 

I don't even know where to begin with some of the quotes in this article, good or bad.

The topic of politics can be aggausting, but I wonder if there isn't merit to this idea?

If we'll have republican local reps regardless based on trends, should people jump party and vote for more moderate candidates, if any exist?

Even if you know your candidate isn't likely to win, do you vote them on principle to vote metrics and data, or do you vote for the lesser evil opponent, even if you feel dirty for it?

I'm not taking or endorsing a side or suggesting anyone should, just curious. Pretend it's the opposite parties than Indiana if it helps thinking through it.

 

My reason for posting this question is to get some perspective, since I don't live further west than Indiana.

Indiana has a lot of conservative tendencies, usually opposes progressive policies, and a little old school bigotry in the form of religion based disagreement with people's life styles, like letter community.

From an outsiders perspective, TX, OK, MO etc are even more extreme.

This permalink above from a comment from a person referencing recently proposed legislation against letter community people specifically, though there's tons of examples of bigotry like the school principal getting sued for discrimination due to a kid's hair (black hair).

We know Lemmy is a bit more populated with left than right thinkers, but regardless, what's going on in these western plains states? Is it as bad as it looks?

Do you personally know some sweet old church ladies who 'hate the gays because they'll going to hell' or are there just more extreme law makers being elected that don't represent the majority?

EDIT: tried to fix link to a conversation instead of a login page.

6
submitted 1 year ago* (last edited 1 year ago) by redfox@infosec.pub to c/cybersecurity@infosec.pub
 

This is not an ad.

Does anyone have experience with Tenable products?

I'm interested in real world experience regarding:

  • cost
  • effectiveness
  • ease of use

I'm playing with Tenable Security Center and Nessus Scanner. I'm early in the deployment, just looking for pointers and whether anyone has used it?

What alternatives is your org using if not?

Can you compare?

Edit, if anyone is interested, I can post results and opinions here also.

view more: next ›