• 1 Post
  • 113 Comments
Joined 2 years ago
cake
Cake day: August 15th, 2023

help-circle

  • remotelove@lemmy.catoSelfhosted@lemmy.worldGot my first script kiddy
    link
    fedilink
    English
    arrow-up
    17
    arrow-down
    1
    ·
    9 hours ago

    Good luck with that, I suppose. Botnets can have thousands, if not hundreds of thousands of infected hosts that will endlessly scan everything on the interwebs. Many of those infected hosts are behind NAT’s and your abuse form would be the equivalent of reporting an entire region for a single scan.

    But hey! Change the world, amirite?



  • remotelove@lemmy.catoSelfhosted@lemmy.worldSecrets
    link
    fedilink
    English
    arrow-up
    5
    ·
    edit-2
    3 months ago

    I would look into something like Doppler instead of Vault. (I don’t trust any company acquired by IBM. They have been aquiring and enshittifying companies before there was even a name for it.)

    Look into how any different solutions need their keys presented. Dumping the creds in ENV is generally fine since the keys will need to be stored and used somehow. You might need a dedicated user account to manage keys in its home folder.

    This is actually a host security problem, not generally a key storage problem per se. Regardless of how you have a vault setup, my approach here is to create a single host that acts as a gateway for the rest of the credentials. (This applies to if keys are stored in “the cloud” or in a local database somewhere.)

    Since you are going to using a Pi, you should focus on that being a restricted host: Only run your chosen vault solution on it. Period. Secure and patch it to the best of your ability and use very specific host firewall rules for minimum connectivity. Ie: Have one user for ssh in and limit another user account to managing vault, preferably without needing any kind of elevated access. This is actually a perfect use case for SELinux since you can put in some decent restrictions on the host for a single app (and it’s supporting apps…)

    If you are paranoid enough to run a HIDS, you can turn on all the events for any type of root account actions. In theory once the host is configured, you shouldn’t need root again until you start performing patches.





  • remotelove@lemmy.catoLinux@lemmy.mlWhy do we hate SELinux?
    link
    fedilink
    arrow-up
    6
    arrow-down
    2
    ·
    edit-2
    4 months ago

    Its just complex

    When a security mechanism becomes more complex to manage than what it is supposed to protect, it becomes a vulnerability itself.

    If you had a minimal system that you built from the ground up yourself and wanted to only have that system function in very specific ways, SELinux would be perfect. I would go so far as to say it would be nearing perfection in some ways.

    Sorry, but in the real world, ain’t nobody got time for that shit. If you use auto configuration tools or pre-canned configs for SELinux on a system you are unfamiliar with, it’s more likely to cause application issues, create security gaps and will likely be shut off by a Jr. admin who really has no fucking clue what he is doing anyway.

    It’s just easier to keep your system patched and ensure basic network security practices anyway.

    It’s not impossible to manage these days. In the early days it was, but most everything is automagic now. If I am not mistaken, SELinux can be enabled to ‘log only’ which would give you data better handled by a HIPS anyway. (Don’t quote me on that.)


  • I installed it and tried it on occasion, but it never worked for finding any coupons. It was the only extension I had that I kept disabled because I always thought it’s interaction with the browser and web pages was sus as fuck.

    TBH, it was more of a curiosity I kept around to explore one day. I also dissect and detonate malware a few times a week, so I just treated Honey as such.

    (That folder named “malware” on my computer is actually real. I pitty the poor soul who steals it thinking its just a joke to store my private data.)

    Unrelated: I finally got my first .SVG downloader today, actually. Whoever the fuck thought it would be a good idea to add a script tag to SVG needs to be put down.




  • Maybe. People with more technical knowledge should understand that LLMs aren’t magic or sentient and have some severe limitations. Hell, I have been tinkering with ML and ANNs for a better part of 15 years or so and they can be extremely useful. (I am no expert and never indend to be.)

    It’s the marketing wank, scams, art theft and all the bullshit that pisses me off now. In that regard, I am squarely in the “Fuck AI” category. There is absolutely nothing phenomenal that has come of this recent bubble in the commercial space. AI generated images are mostly trash, articles are riddled with gross factual errors, phishing and other scams are more realistic (and maybe even more dynamic) now and public forums contain even more annoying bots. And the worst bit is that AI generated media, like music, is just a collection of averaged values with no originality.

    That bell curve represents something but it isn’t IQ.



  • Of course I do, but its very conditional in your case. For the record, I did miss that you had port forwarding enabled already and read your post as if you were just trying to connect to the open internet and see any traffic going to some rando servers. That would be a very different situation.

    How is the traffic proxied locally? Does the VPN client even allow inbound connections? Is a virtual interface configured for the VPN and is there an inbound port open?

    What makes this situation conditional is that there are several ways your VPN client could be configured and it is my guess that it is the bottleneck in this case. If you tried every address that you could find and saw nothing, chances are, there is no traffic to be seen. Any stateful firewall will drop an inbound SYN or traffic not related to an established connection.

    Your routing table may give some good clues as to where traffic is going as well. For example, the VPN client could be creating a local default gateway IP. Unless there is a split path configured, all traffic should be traversing that IP, regardless of what it is.

    So, can you elaborate more on the route your traffic is taking? Listening on 0.0.0.0 can sometimes work, but usually a specific interface needs to be defined as well. In some cases, tcpdump setting the interface to promiscuous mode can break things.

    Also, it’s a VPN. How traffic is getting routed in through the tunnel could be problematic. I have just been assuming that everything is fine up to the client you use and the computer sending traffic to inside your network is part of the VPN.


  • Ok, you are putting the cart a few steps before the horse here and put simply, you can’t just tap the entire Internet from behind your own Internet connection and “through” a VPN. (A VPN “tunnel” is a bit misleading on how traffic is seen in the wire, but that is still many more steps ahead.)

    Watching pcap is cool, but you need a fundamental understanding of networks and network protocols before you can actually see more than characters of the Matrix and understand what you are tapping into from the start.

    To kick off your own research path, start reading into the OSI Model, TCP vs UDP, traffic routing and subnetting. You need to understand where you need to be to see the traffic you want to see first.

    Unfortunately, I can’t begin to answer your question without some foundation in place first.



  • Thats kinda is how neural networks actually function. They don’t store massive amounts of data but, similar to us, tweak and adjust complex pathways of neurons that kinda just convert an input into a response.

    When you ask an LLM a question you are actually getting a list of words based on probabilities, not anything the LLM had to “think about” before responding. During its training, different patterns fed to the AI tweak and balance how and when specific neurons should fire. One way to think about it is that “memories” or data is stored in how the paths are formed, not actually in the core of the neuron itself.

    There are several hundred configurations of artificial neural networks that can mimic different functions of our brains, including memory.



  • That is probably some good theory crafting, but I have no idea as that is a level of psychology that is beyond me. (That sentence looks a little smart-ass, but it absolutely isn’t, btw. 100% curious.)

    Personally, I can say is that I tend avoid foods that cause pain and may even subconsciously steer away from them too. I don’t actively seek out things like tomato sauce, but wouldn’t likely turn down a free spaghetti meal either.

    I do also tend to prefer cereal and milk, generally heavy fiber types. Antacids are great, but sometimes, just giving my stomach something harder to break down works fine too.


  • Just stay away from nearly anything that uses “healing ions” in its marketing material. If it’s not a straight-up fake product, it’ll likely kill you in due time. (Ozone generators are an exception unless you get a beefy one like mine, and then it can actually kill you.)

    Edit: lol! I have seen that video and made my comment about ions before I clicked it. Good video, btw. 5 stars.