Just the Browser je projekt, 'který vám pomůže v internetovém prohlížeči deaktivovat funkce umělé inteligence, telemetrii, sponzorovaný obsah, integraci produktů a další nepříjemnosti' (repozitář na GitHubu). Využívá k tomu skrytá nastavení ve webových prohlížečích, určená původně pro firmy a organizace ('enterprise policies'). Pod linuxem je skriptem pro automatickou úpravu nastavení prozatím podporován pouze prohlížeč Firefox.
Svobodný multiplatformní herní engine Bevy napsaný v Rustu byl vydán ve verzi 0.18. Díky 174 přispěvatelům.
Miliardy korun na digitalizaci služeb státu nestačily. Stát do ní v letech 2020 až 2024 vložil víc než 50 miliard korun, ale původní cíl se nepodařilo splnit. Od loňského února měly být služby státu plně digitalizované a občané měli mít právo komunikovat se státem digitálně. Do tohoto data se povedlo plně digitalizovat 18 procent agendových služeb státu. Dnes to uvedl Nejvyšší kontrolní úřad (NKÚ) v souhrnné zprávě o stavu digitalizace v Česku. Zpráva vychází z výsledků víc než 50 kontrol, které NKÚ v posledních pěti letech v tomto oboru uskutečnil.
Nadace Wikimedia, která je provozovatelem internetové encyklopedie Wikipedia, oznámila u příležitosti 25. výročí vzniku encyklopedie nové licenční dohody s firmami vyvíjejícími umělou inteligenci (AI). Mezi partnery encyklopedie tak nově patří Microsoft, Amazon a Meta Platforms, ale také start-up Perplexity a francouzská společnost Mistral AI. Wikimedia má podobnou dohodu od roku 2022 také se společností Google ze skupiny
… více »D7VK byl vydán ve verzi 1.2. Jedná se o fork DXVK implementující překlad volání Direct3D 5, 6 a 7 na Vulkan. DXVK zvládá Direct3D 8, 9, 10 a 11.
Byla vydána verze 12.0.0 knihovny libvirt (Wikipedie) zastřešující různé virtualizační technologie a vytvářející jednotné rozhraní pro správu virtuálních strojů. Současně byl ve verzi 12.0.0 vydán související modul pro Python libvirt-python. Přehled novinek v poznámkách k vydání.
CreepyLink.com je nový zkracovač URL adres, 'díky kterému budou vaše odkazy vypadat tak podezřele, jak je to jen možné'. Například odkaz na abclinuxu.cz tento zkracovač převádí do podoby 'https://netflix.web-safe.link/logger_8oIlgs_free_money.php'. Dle prohlášení autora je CreepyLink alternativou ke zkracovači ShadyURL (repozitář na githubu), který dnes již bohužel není v provozu.
Na blogu Raspberry Pi byla představena rozšiřující deska Raspberry Pi AI HAT+ 2 s akcelerátorem Hailo-10 a 8 GB RAM. Na rozdíl od předchozí Raspberry Pi AI HAT+ podporuje generativní AI. Cena desky je 130 dolarů.
Wikipedie slaví 25. výročí svého založení. Vznikla 15. ledna 2001 jako doplňkový projekt k dnes již neexistující encyklopedii Nupedia. Doména wikipedia.org byla zaregistrována 12. ledna 2001. Zítra proběhne v Praze Večer svobodné kultury, který pořádá spolek Wikimedia ČR.
Po více než dvou letech od vydání předchozí verze 2.12 byla vydána nová stabilní verze 2.14 systémového zavaděče GNU GRUB (GRand Unified Bootloader, Wikipedie). Přehled novinek v souboru NEWS a v aktualizované dokumentaci.
Every system administrator knows it – you have got a Linux server connected to the internet and this box runs several services. There are some users who access these services, but usually there is also a group of attackers who try to break your services or gain access to the box. These attacks spoil log files by large amount of "access denied" messages and increase load of the services. This article discusses some possibilities how to defend your Linux machine against these attackers.
Generally there are two types of defence – preventive arrangements and active defence:
The most of the preventive steps decreases risk of attack about 90 %, but on the other hand these arrangements usually cannot be used for public services (such as WWW or FTP) because they either hide the service (using not well-known port) or limit group of users with access to the service. That's why the most of preventive steps above we can only use for private services with limited number of users.
For public services (accessible all around the world) we need something stronger – we need to differentiate between good and bad users and cut off the bad ones as soon as possible. Each user is identified by his IP address, but it may change during the time and also we have to take NAT (Network Address Translation) into account. That means we cannot only add new IP addresses on the blacklist. We also have to delete the old ones because they might have belonged to some good user.
There is several blacklisting tools which differ in some minor features, but the main principal of work is always the same – they parse log files of guarded services and if someone is doing something nasty, he is banned. Banning of the user is usually done using hosts.deny file or using iptables.
Probably the oldest tool is called DenyHOSTS. It supports only SSH protection and nowadays it is unmaintained and quite obsolete.
Also there is IPQ BDB Filter. It is quite interesting project which focuses on large networks. It uses netfilter for blacklisting and Berkeley DB for blacklist storage. It offers high performance (written in C) and flexibility due of modular architecture. Unluckily it is still in development, documentation is not too good and especially for inexperienced user it would be quite difficult to set it up. IPQ BDB Filter is surely not an out-of-the-box solution, but advanced users may appreciate it.
The most common used tools are fail2ban and SSHGuard. SSHGuard is fast, written in C and can be connected directly to syslog. It is ported to many UNIX based operating systems. On the other hand there is lack of configuration options and advanced administrators may say that it is a black box. This article focuses on fail2ban, but I think, SSHGuard is also a good option.
Fail2ban is quite simple and easy-to-use blacklisting tool. There are some highlights:
filter.d directory).action.d directory).jail.conf).
Jail has got the following options:
enabled – allows you to activate or deactivate the jail.filter – name of jail filter, each match increments the jail counter.logpath – path to the log file provided to the filter.maxretry – minimal value of jail counter to trigger the action.findtime – when filter finds nothing, the counter is reset to zero after findtime seconds.bantime – number of seconds to ban the host for.If you want to protect a service, you must create a jail for it. Jail specifies what log file to search in, what to search and what to do when there is a rule violation. Fail2ban's default filters and actions are sufficient for the most of users, so usually the only thing you have to do after the installation is the jail creation.
fail2ban if it available in your distribution. If not, you can download
it from www.fail2ban.org./etc/fail2ban/etc/fail2ban/jail.conf file and enable jails you are interested in./etc/init.d/fail2ban start command and let it start automatically
using chkconfig or similar command.If you did not get ban, you can try the following things:
fail2ban-client -d command. It will dump the current configuration
and you can check whether the fail2ban server actually uses the jails you defined.fail2ban-regex logfile regex command. Both logfile and regex you can find
in dumped configuration. The command will parse the log file and print number of matches.
If something goes wrong, you will probably find it there.Fail2ban is nothing more than a log parser. Besides the regular expressions it also has to parse the timestamps. Although it supports several formats of timestamp, fail2ban cannot deal with localized month names correctly. Here you have two options:
export LC_TIME="en_US.UTF-8" – in
its init script./usr/share/fail2ban/server/datetemplate.py file.TABLE["Jun"] = [u"čen"] etc. Save the file.python -m compileall /usr/share/fail2ban/server/datetemplate.py.
Imagine you have a small home router running Linux. This box is maintained via SSH from private network,
but sometimes it would be very handy to access it from outside. If you permitted port 22 on WAN interface,
you would become a target of script kiddies very quickly. In addition this service would be almost never
used. It would be nice to let the port closed and open it only when we need to access the machine. And this
is exactly what konckd does.
Knockd monitors incoming network connections and their target ports. If it detects a "magic sequence", like
ports 7000/TCP, 8000/TCP, 9000/TCP accessed in sequence within 30 seconds, it triggers a specific
action, for example it opens port 22 for 5 minutes.
knockd. It it is not available in your distribution, get it here:
http://www.zeroflux.org/projects/knock./etc/default/knockd where you
can enable the service and specify command line options for knockd. In RedHat based distributions this
will be probably different./etc/knockd.conf. Its structure is very simple:
[openSSH]
sequence = 7000,8000,9000
seq_timeout = 30
command = /sbin/iptables -A Knocking -s %IP% -p tcp --dport 22 -j ACCEPT
tcpflags = syn
cmd_timeout = 15
stop_command= /sbin/iptables -D Knocking -s %IP% -p tcp --dport 22 -j ACCEPT
The section above defines magic sequence of ports 7000, 8000, 9000 within 30 seconds. When detected,
executes the command and after 15 seconds executes the stop_command./etc/init.d/knockd start.
Knockd comes with a small utility called knock. Its first argument is a hostname to knock, the rest of them
are port numbers to knock (the magic sequence). When you want to knock the SSH service from the example above, you would use
the following command: knock myverysecretrouter.com 7000 8000 9000.
Of course, it may happen very easily that you don't have the knocking utility with you. In this case you can use almost any application generating TCP requests (or UDP requests if your knockd waits for them). It can be a telnet application or your web browser (you enter address http://myverysecretrouter.com:7000, then http://myverysecretrouter.com:8000 etc.). There are only two limitations:
seq_timeout and the sequence won't be accepted.
If knockd does not open ports for you, stop the service and run it in the foreground in verbose mode:
knockd -D -i eth0 -v. It should print out what sequence it really received and why it was not accepted.
If the magic sequence is recognized correctly and the port is not opened anyway, check your iptables command. If you use
iptables -A command, remember that the rule is added at the end of your firewall chain definition. Is not
your one to last rule "reject all other packets"? It is a good idea to create an empty chain for knockd, add this chain
on the right place during firewall initialization and then let knockd modify only its own chain.
This simple application written in Perl monitors log files stored on the machine and creates a summary which is usually sent by e-mail to the administrator. Of course, this does not protect your services against some misuse, but it is a useful security supplement. Logwatch supports all common services and it is quite easy to add a new one. Parsed time range is restricted to one day or the whole log file, for example, it is not possible to generate one week log summary. Logwatch is not a daemon, it is only a small script run by CRON, so for the most of time it does not consume any CPU time.
logwatch package, it is available in all main distributions./usr/share/logwatch/default.conf (note it is a directory).
If you want to change an option, you should copy the affected file to /etc/logwatch. This
directory is initially almost empty and it is intended for custom configuration which will not be
overwritten by package updates. Of course, settings in /etc are preferred to defaults.logwatch.conf. The most important options include:
MailTo – local user account or a full email address where to send the log files.MailFrom – sender of the emails.Range – what time period should be processed, valid options are Today, Yesterday
and All.Detail – verbosity of the log summary, 0 – 10.I have mentioned some useful tips how to enhance security of network services. Please keep in the mind that the best protection is to turn off unnecessary services. If it is not possible, you can apply some of tips written above. Also please do not consider port knocking to be a security mechanism. It is only a security supplement, which does not replace standard methods of authentication.
Thank you for reading, I hope this article will help you to protect your network services better.
Tiskni
Sdílej:
Run services on other (not well-known) ports.jsem se rozhodl že se zbytkem článku nemá ani smysl ztrácet čas. :)
(Každopádně i tak je to stále tak trochu "Security through obscurity".
)