grumpybozo, to FreeBSD
@grumpybozo@toad.social avatar

I will refrain from looking up who decided that needed to lose a magic comment line from every init script and config file but didn’t need etcupdate (or whatever we're calling mergemaster now) to understand that change as a no-op, because if I were to identify that person I would feel compelled to find them and extract my wasted time from the front end of their remaining lifespan.

grumpybozo, to random
@grumpybozo@toad.social avatar

From a supposed "Linux Installation Guide" for the product referenced in https://toad.social/@grumpybozo/112297970090554349

  1. The program "tar" does not unzip anything
  2. If you want me to run Install.sh, do not tell me to run install.sh. It’s not Windows, philistine!
  3. Maybe YOU should tell ME if I need to be root for your "agent" installation?

Edit: of course it needs to be root. There is no documented way to run as any other user.

grumpybozo,
@grumpybozo@toad.social avatar

So, this thing installs a cron job. Fine. It calls a shell script every 7 minutes. That is a really short script because all it does is grep the output of ps for the agent and uses 'service' to start it if not. Which would be fine on an old Linux system. This is not so old that 'service' doesn’t just redirect to systemctl and chide the user. So we were getting mail to root every 7 minutes.
I assume there’s some reason they don’t just actually make it a service.

grumpybozo,
@grumpybozo@toad.social avatar

And why is secure.log growing? Oh, look, that ‘sensor’ is doing a bunch of stuff using ‘sudo’ which is funny when you consider that it is running as root and has no documentation of how to run it in any other way. I think that means it is actually firing off a shell to run the sudo command…
It has become too cheap to launch processes. (not my real issue here…)

grumpybozo, to ipv6
@grumpybozo@toad.social avatar

#IPv6 is anti-capitalist.
IPv4 address space is an exploitable scarcity that ISPs do not want to give up. We can’t each have our own IPv4 address, so money determines who gets one (or more.) By design, IPv6 gives every network 2^64 addresses and there are 2^64 of those networks. It is difficult to conceive of a way to use enough of it to ever be constraining.
#InfoSec #Sysadminnery… (1/2)

grumpybozo, to random
@grumpybozo@toad.social avatar

: If you do not understand how your whiz-bang instance is doing encryption, don’t fiddle around with it to make it "more secure." I.e. DO NOT close that admin backdoor "master key."

I hate the fact that 5 years after coming back to this gig I am still cleaning up from shit done in my 2-year hiatus.

grumpybozo,
@grumpybozo@toad.social avatar

And also: Sysadmins should NOT look at the DB schema.

grumpybozo, to infosec
@grumpybozo@toad.social avatar

What the world really needs is a readable book on Information Risk Analysis For Toddlers.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • megavids
  • thenastyranch
  • rosin
  • GTA5RPClips
  • osvaldo12
  • love
  • Youngstown
  • slotface
  • khanakhh
  • everett
  • kavyap
  • mdbf
  • DreamBathrooms
  • ngwrru68w68
  • provamag3
  • magazineikmin
  • InstantRegret
  • normalnudes
  • tacticalgear
  • cubers
  • ethstaker
  • modclub
  • cisconetworking
  • Durango
  • anitta
  • Leos
  • tester
  • JUstTest
  • All magazines