<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Security on traviscj/blog</title>
    <link>https://traviscj.com/blog/tags/security/</link>
    <description>Recent content in Security on traviscj/blog</description>
    <generator>Hugo</generator>
    <language>en-us</language>
    <lastBuildDate>Fri, 15 Apr 2016 00:00:00 +0000</lastBuildDate>
    <atom:link href="https://traviscj.com/blog/tags/security/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>switching over to https</title>
      <link>https://traviscj.com/blog/post/2016-04-15-switching_over_to_https/</link>
      <pubDate>Fri, 15 Apr 2016 00:00:00 +0000</pubDate>
      <guid>https://traviscj.com/blog/post/2016-04-15-switching_over_to_https/</guid>
      <description>&lt;p&gt;One of the things I&amp;rsquo;ve been meaning to do forever is switch things over to https.&#xA;By &amp;ldquo;things&amp;rdquo;, I mean the set of websites I run for some family and friends.&#xA;I tried it out with my personal website first, then flipped over the rest.&lt;/p&gt;&#xA;&lt;h2 id=&#34;implementation-notes&#34;&gt;implementation notes&lt;/h2&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;I used the &lt;a href=&#34;https://letsencrypt.org/getting-started/&#34;&gt;letsencrypt start guide&lt;/a&gt; to generate the certificates.&lt;/li&gt;&#xA;&lt;li&gt;Modified the nginx config to:&#xA;a. serve ssl/https traffic on port 443 for the given domain with the proper https certificates/etc.&#xA;b. forward non-ssl/http traffic on port 80 to port 443 for the given domain&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;h2 id=&#34;verification&#34;&gt;verification&lt;/h2&gt;&#xA;&lt;p&gt;It turns out that the nginx configuration files are a little bit error prone.&#xA;This probably means that I am doing something wrong, like not using some configuration management tool like puppet or ansible or whatever.&#xA;But for something as small scale as my site, it doesn&amp;rsquo;t really meet the cost-benefit threshold for learning a new tool/language.&#xA;I also even considered spinning up a simple one-off configuration generator that I&amp;rsquo;d need to figure out how to override and extend as needed.&lt;/p&gt;</description>
    </item>
    <item>
      <title>SSL Cert Reissue</title>
      <link>https://traviscj.com/blog/post/2014-04-09-ssl_cert_reissue/</link>
      <pubDate>Wed, 09 Apr 2014 00:00:00 +0000</pubDate>
      <guid>https://traviscj.com/blog/post/2014-04-09-ssl_cert_reissue/</guid>
      <description>&lt;p&gt;Like many others, I have been hit by the &lt;a href=&#34;http://heartbleed.com/&#34;&gt;heartbleed bug&lt;/a&gt;, which kinda sucks.&#xA;I don&amp;rsquo;t use SSL for anything very critical, but I do use it at [tcj.io tcj.io], my &amp;ldquo;projects&amp;rdquo; website.&#xA;My host, &lt;a href=&#34;https://linode.com&#34;&gt;Linode&lt;/a&gt;, has done a great job of &lt;a href=&#34;https://library.linode.com/security/openssl-heartbleed&#34;&gt;providing tutorials&lt;/a&gt; on how to deal with the situation.&#xA;The obvious first step (a couple of days ago) was to upgrade openssl itself:&lt;/p&gt;&#xA;&lt;pre&gt;&lt;code&gt;apt-get update&#xA;apt-get upgrade&#xA;&lt;/code&gt;&lt;/pre&gt;&#xA;&lt;p&gt;But this only prevents the server from leaking keys going forward.&#xA;Since the vulnerability was in the wild for quite some time, I thought it prudent to reissue the certificates as&#xA;well.&#xA;Now that I had a bit more time, I went ahead and did a reissue to make sure that nothing going forward gets leaked.&#xA;This is (as usual) a bit annoying, because of the verification procedure at [Gandi gandi.net].&#xA;Otherwise, they&amp;rsquo;re pretty solid though, so I guess I&amp;rsquo;ll give them a pass on this one.&#xA;And they did allow a reissue without revoking, so that&amp;rsquo;s a good step!&lt;/p&gt;</description>
    </item>
    <item>
      <title>More cracking D-Link Files</title>
      <link>https://traviscj.com/blog/post/2012-06-27-more_cracking_d-link_files/</link>
      <pubDate>Wed, 27 Jun 2012 00:00:00 +0000</pubDate>
      <guid>https://traviscj.com/blog/post/2012-06-27-more_cracking_d-link_files/</guid>
      <description>&lt;p&gt;Somehow, in the process of a router reconfiguration, I reset the password without the new password getting saved into 1Password.&#xA;So I found myself locked out of my own router.&#xA;I was about to reset it, thinking, &amp;ldquo;Hey, at least I have a backup of the settings from 2 nights ago!&amp;rdquo; and then realized, &amp;ldquo;I bet that settings file has the password right in it.&amp;rdquo;&lt;/p&gt;&#xA;&lt;p&gt;Googling around a bit turned up &lt;a href=&#34;http://www.shulerent.com/2009/08/21/cracking-the-d-link-settings-file/&#34;&gt;this guy&lt;/a&gt;, but he only wrote VBA and a Windows binary.&#xA;His pseudo-code looked pretty easy to translate into Python, so I did just that. Here&amp;rsquo;s the result: &lt;a href=&#34;https://github.com/traviscj/decode_gws&#34;&gt;D-Link DIR615 B2 v2.25 Decoder&lt;/a&gt; (no encoder, yet&amp;hellip;)&lt;/p&gt;</description>
    </item>
    <item>
      <title>Found - Wordpress Spam Virus in Theme files</title>
      <link>https://traviscj.com/blog/post/2009-04-01-found_wordpress_spam_virus_in_theme_files/</link>
      <pubDate>Wed, 01 Apr 2009 00:00:00 +0000</pubDate>
      <guid>https://traviscj.com/blog/post/2009-04-01-found_wordpress_spam_virus_in_theme_files/</guid>
      <description>&lt;p&gt;Almost a month ago, I was helping &lt;a href=&#34;http://www.jdbeals.com/blog&#34;&gt;my good buddy Beals&lt;/a&gt; get his Wordpress website set up. On looking close, I noticed something a little weird in a theme he had found(NOT Wordpress proper, to be clear):&lt;/p&gt;&#xA;&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;D-69-91-134-36:black-abstract-20 tjohnson$ ls -alh *&#xA;-rw-r--r--  1 tjohnson staff  528 2008-07-24 08:35 404.php&#xA;-rw-r--r--  1 tjohnson staff 3.9K 2008-07-24 08:35 comments.php&#xA;-rw-r--r--  1 tjohnson staff 8.0K 2008-10-22 20:44 footer.php&#xA;-rw-r--r--  1 tjohnson staff  871 2008-10-22 10:10 functions.php&#xA;[more removed here]&#xA;&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;As you can see, the footer and functions files are both modified much more recently than every other file, which seemed strange to me. So I took a look at the file:&lt;/p&gt;</description>
    </item>
    <item>
      <title>GenHosts</title>
      <link>https://traviscj.com/blog/post/2009-02-24-genhosts/</link>
      <pubDate>Tue, 24 Feb 2009 00:00:00 +0000</pubDate>
      <guid>https://traviscj.com/blog/post/2009-02-24-genhosts/</guid>
      <description>&lt;p&gt;Winter quarter 08, the hosts.allow files used by tcpwrappers was getting unwieldy. For one thing, we had certain groups of hosts that were all allowed to connect to eachother anywhere, some groups that were only allowed one port on one computer, some that were allowed certain parts of machines. It was basically a mess to try and keep up with it. So I wrote a set of scripts to let us update one place and have it synchronize everywhere else, all in very simple XML files.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Johnson vs Acronis</title>
      <link>https://traviscj.com/blog/post/2008-08-02-johnson_vs_acronis/</link>
      <pubDate>Sat, 02 Aug 2008 00:00:00 +0000</pubDate>
      <guid>https://traviscj.com/blog/post/2008-08-02-johnson_vs_acronis/</guid>
      <description>&lt;p&gt;The story goes something like this: Originally, we used external hard drives plugged in via USB to our servers to back up our servers. This worked well, except that we had two external drives and 7 servers. About this time I started working this job and immediately set up a MediaWiki website for storing documentation and a Mantis Bug Tracker website for storing information about ongoing projects–I think I’ll try to write a post about that at some point as well. Anyways, these two websites originally ran on my personal webserver in Prosser, but we decided to run them on a company-owned server instead, and that this new machine could act as both a backup server and a webserver for those two websites.&lt;/p&gt;</description>
    </item>
    <item>
      <title>PHP Vulnerability Checklist</title>
      <link>https://traviscj.com/blog/post/2008-07-10-php_vulnerability_checklist/</link>
      <pubDate>Thu, 10 Jul 2008 12:00:00 +0000</pubDate>
      <guid>https://traviscj.com/blog/post/2008-07-10-php_vulnerability_checklist/</guid>
      <description>&lt;p&gt;Ray(the boss) and I were chatting about how we should implement our secure upload page. The way it should work is, an IP is added to the genhosts database, it sets up a 5 minute wait, and at the end of five minutes, redirects to the data upload page, at which point the computer is allowed to connect, since the new IP has propogated into /etc/hosts.allow(via a cronjob that takes MySQL entries and parses them(via HTTP and XML) into the standard /etc/hosts.allow format). It’s basically working, but we’re having a bunch of trouble getting IE and Firefox to redirect, since IE apparently detects my window.location.href and location.replace calls as popups, and blocks them.&lt;/p&gt;</description>
    </item>
    <item>
      <title>NSA&#39;s RHEL5 Guide</title>
      <link>https://traviscj.com/blog/post/2008-07-07-nsas_rhel5_guide/</link>
      <pubDate>Mon, 07 Jul 2008 00:00:00 +0000</pubDate>
      <guid>https://traviscj.com/blog/post/2008-07-07-nsas_rhel5_guide/</guid>
      <description>&lt;p&gt;One of my tasks at work is to write up a security checklist of sorts, and from one of Ryan’s notes, I happened across the NSA’s Red Hat Enterprise Linux 5 guide. It’s pretty cool and covers basically everything. &lt;a href=&#34;http://www.nsa.gov/snac/os/redhat/rhel5-guide-i731.pdf&#34;&gt;Have a look&lt;/a&gt;&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
