When it comes to efficiently assigning IP addresses to multiple clients, DHCP is the de facto standard in most networks. In this post, we’ll explore DHCP configuration on Red Hat Enterprise Linux 7 and give an example of how to install it, as well as a few configuration options for dhcpd. With a basic understanding of DHCP, you can get your network up and running almost immediately.
Continue reading Basic DHCP Setup
Meraki is a pretty well known company, and has been a part of Cisco since 2012. There are a multitude of cloud based managed Wi-Fi solutions, but Meraki is one of the most prolific and has a variety of cloud managed products to suit most any size company’s needs. Several of their devices have similar setup steps, but today we will cover the initial out of the box setup of a Meraki MX64 security appliance that will have your MX appliance online and configured in your dashboard in no time.
The idea of using file integrity monitoring to validate your operating system and applications has been around since the late ’90s, with programs like Tripwire. Today, we have a steady stream of companies offering their own version for FIM. However, one consistent and reliable open source solution for Linux is AIDE or the Advanced Intrusion Detection Environment.
Continue reading AIDE – File Integrity Monitoring
Is it possible to get someone’s password in plaintext over ssh? Yes! Surely, this makes no sense when the purpose of ssh is to prevent such a thing. Well, I’m speaking of monitoring the session directly from the server the user is connecting to and not across the network.
Continue reading Sniffing SSH Passwords
By default, the PAM configuration files in Linux allow for null or empty passwords due to the nullok feature. From the manpage,
# man pam_unix
The default action of this module is to not permit the user access to a service if their official password is blank. The nullok argument overrides this default.
Continue reading Disable null passwords
We have all used snmp for many years to help monitor our systems and networks but most admins have been reluctant to migrate to v3 due to the perceived increase in complexity. This post will show you how to quickly and easily enable snmpv3 on your linux system to take advantage of the additional security features to support authentication and privacy.
Install software packages
# yum install net-snmp net-snmp-utils
Continue reading Configuring snmpv3 in Linux
As you know, Linux has a standard set of file access settings based on the concept of read, write, and execute permissions that determine who may access the file or directory in question. The most common way to set and change these permissions is to use commands like chmod, chown or chgrp. While these are powerful commands and have their place, there are occasions where it may be advantageous to fine tune the access to a file or directory. This is where file access control lists or FACLS come in.
Continue reading Linux Lab – Access Control Lists
After setting up your Chrony NTP Server and Client, we are now ready to configure authentication using randomly generated symmetric keys. This is an important option beyond the allow/deny rules within your /etc/chrony.conf file to maintain the integrity of the service.
Continue reading RHEL 8 and Chrony – Part 3
In Part 1, we discussed setting up Chrony from a client perspective. This post will show how to configure the server side and investigate some of the options available within the /etc/chrony.conf configuration file.
Install the Chrony package
Continue reading RHEL 8 and Chrony – Part 2
The Network Time Protocol or NTP is essential for synchronizing system clocks across your environment. Having a reliable and accurate time service is not only important for many different applications but for logging and auditing as well. In RHEL 8, Chrony is used for implementing NTP. In Part 1, we will review setting this service up as a client and look at the basic functionality of the chronyc command to interact with the chrony daemon, chronyd.
Continue reading RHEL 8 and Chrony – Part 1