𝒍𝒆𝒎𝒂𝒏𝒏

Hey! Please contact me at my primary Fedi account: @lemann@lemmy.dbzer0.com

https://lemmy.one/u/lemann@lemmy.dbzer0.com

  • 4 Posts
  • 578 Comments
Joined 1 year ago
cake
Cake day: June 6th, 2023

help-circle





  • It kinda depends on the setup I think, especially when vlans and firewalls are involved, you’d likely need additional payloads to make further progress in that kind of environment IMO. Something granting persistent remote access to the compromised machine would be the most ideal option.

    As always physical access is pretty much game over though lol.

    My cams are only accessible via an authenticated endpoint hosted on a dedicated machine, which acts as a “bridge” between the VLAN that the cameras are on (no internet access), and another VLAN hosting internal services, like home assistant, plex etc.

    Aside from physical access, the only way to access the cams (that I can think of) would be via some exploit in Home Assistant, or by brute forcing the password to (any of) my network switches to access the management VLAN, changing the VLAN the cameras are set on to something else (bypassing the routing, firewall setup, and auth “bridge” entirely). Or maybe just exploiting the bridge machine directly and dropping a payload to forward the cams out to the net via the services VLAN

    With physical access, you could chop up the PoE for an external camera and using that as an ingress point - but you’d only have access to the cameras and the bridge machine unless you exploited that too. At this point the zabbix client on the bridge machine would have notified me that a camera’s dropped off the network, unless you dropped a payload to force it to return a good status lol

    Does sound like a very fun exercise though tbh


  • I think most people are just used to Google, I used to be several years ago before moving to DDG.

    Now I find Google is way too… “tutorially” and “bloggy” with results, and actually slows down my workflow a lot when I’m looking for a specific thing immediately - usually a bit of scrolling to get what I’m looking for.

    DDG (for my use case as a casual search engine, and something to search docs for work) gets you to whatever you want with a much, much shorter and concise query, and pretty much always gets it right each time as the first result


  • I agree with OP here, these results are not great.

    OP searched for the redis docker image, not a tutorial on how to use it, not a tutorial on why redis should be run in docker, and did not search for redis docker docs. While these are relevant, they should be further down, not the top result. DDG gets this right, and I’m pretty sure other search engines do too.

    For a total newbie, these results are probably OK, but for a technical person who knows what they want literally as they type it, Google’s results are (excuse my french) simply shit. DDG is miles better at handling this stuff, and they don’t need your personal data to do it well either.

    Edit: Just went and searched “redis docker image” in a private tab on Google, and the docker hub image for Redis is not even shown on the first page of results







  • Flash drive hidden under the carpet and connected via a USB extension, holding the decryption keys - threat model is a robber making off with the hard drives and gear, where the data just needs to be useless or inaccessible to others.

    There’s a script in the initramfs which looks for the flash drive, and passes the decryption key on it to cryptsetup, which then kicks off the rest of the boot mounting the filesystems underneath the luks

    I could technically remove the flash drive after boot as the system is on a UPS, but I like the ability to reboot remotely without too much hassle.

    What I’d like to do in future would be to implement something more robust with a hardware device requiring 2FA. I’m not familiar with low level hardware security at all though, so the current setup will do fine for the time being!



  • With the fake parts scandal for airplanes I wonder if this should be mandatory for parts that impact public safety for public transport like trains, buses, planes and so on.

    Airplanes are vastly more complex though. Four engines, flying at extremely high altitudes at hundreds of km/h, fully airtight, powerful onboard generators, food prep areas, bathroom etc, extensive ethernet networking for the small IFE units and WiFi access points, list goes on…

    Whereas a train doesn’t have anything close to that, even the high speed ones with all the bells and whistles, so I think it would be a bit unreasonable to expect them to be held to the same standards as an airplane.

    The only train I’d suggest an exception for would be a maglev though - OEM parts only there please, especially for traction and em equipment 😳

    Dont get me wrong, I want a full right to repair enshrined in law and using a system like this just to prevent it is clearly wrong, but if it could be adapted to allow for critical parts to be made under license by third parties and helped prevent fake parts then may be a small amount of good can come from this shitty practice.

    Some independent validation of the manufacturing materials, their grade and assembly quality could work well here, since I’m not too sure if blindly trusting the parts manufacturers would be a great idea as long as they have profits in mind





  • I think so, assuming these malicious packages are all primitive enough to just look for the single file in a user’s home folder lol. The only downside here is needing to provide the keyfile location to ssh every time you want to connect… Although a system search would pretty much defeat that instantly as you mention

    SSH keyfiles can be encrypted, which requires a password entry each time you connect to a SSH server. Most linux distros that I’ve used automatically decrypt the SSH keyfile for you when you log in to a remote machine (using the user keyring db), or ask you for the keyfile password once and remember it for the next hour or so (using the ssh-agent program in the background).

    On Windows you can do something similar with Cygwin and ssh-agent, however it is a little bit of a hassle to set up. If you use WSL i’d expect the auto keyfile decryption to work comparably to Linux, without needing to configure anything