Firewalls and Services

Firewalls and Services

You should consider security anytime you run processes that provide some kind of service over a network.  For instance, if you have a website, that service is providing web pages to clients that make a request for it.  The service does not pick and choose who gets what content.  Instead, it hands that off to lower layer functions.  What if a client makes a request that the process doesn’t have instructions on how to handle.  Furthermore, what if that client…

Read More Read More

Automation with SSH tunneling

Automation with SSH tunneling

In the last post I covered how SSH key pairs can be used as a form of two factor authentication, commonly known as 2FA.  In this post I’ll be covering SSH as a means to establish secure communications between systems.  Using SSH will provide a way to run commands on remote hosts, whether they be on node on a local network or accross the globe.  The key pair security is a way to set the remote host to only allow…

Read More Read More

Two Factor Authentication

Two Factor Authentication

Internet facing services are under constant attack.  They are a coveted resource that provide footing when exploited.  It’s prudent to not loose control of your services to abuse.  One way to do this is to enable two factor authentication, commonly known as 2FA. Traditional authentication is based on what you know, a user name and a password.  With 2FA, the second factor of authentication is what you have, a number token.  In this post I’ll be covering how to setup…

Read More Read More