lungdart

joined 2 years ago
[–] lungdart@lemmy.ca 2 points 11 months ago

Pass uses GPG and git under the hood.

You create keys to encrypt your data, and keep the encrypted data in git locally which can be cloned to github, gitlab and the like.

It's just files on your computer, so you can back them up that way, or use a thumb drive as a remote git repo and push to it.

Day to day Type pass and tab complete to find the entry. Enter the command and be prompted to unlock it. It will then print the credentials to the terminal.

To create a new password, you type and add command followed by a name and a text editor opens up for you to type credentials in, or it can generate them for you.

To keep your backup up to date you just git push to the remote of your choice. I use github

[–] lungdart@lemmy.ca 45 points 1 year ago (1 children)

The majority of the Internet's routing and switching architecture is BSD based. Historically it had the most stable and performant network stack of all the OSs.

I used it extensively at one job in a previous life when I was a network appliance developer. It was rock solid and lightning fast. Tried it as a desktop at home and had a terrible experience.

The little differences in the Unix commands used to drive me nuts as well...

[–] lungdart@lemmy.ca 54 points 2 years ago (2 children)

Doubt. You probably need to set the file owners in your volume to the same user running in the container.

[–] lungdart@lemmy.ca 49 points 2 years ago (2 children)

Shaka, when the walls fell...

[–] lungdart@lemmy.ca 6 points 2 years ago (1 children)

https://discord.com/servers/8311-886329492438671420

Get rid of their junk equipment and put something decent in. Discord link is a group dedicated to doing just that. You may find info for your specific ISP.

If you do it right, you won't even need their gear inline at all.

[–] lungdart@lemmy.ca 6 points 2 years ago (4 children)

I use Ranger day to day and just access external volumes from their automatic mount points in /media, or I mount them manually to /mnt.

It works for me!

[–] lungdart@lemmy.ca 9 points 2 years ago (1 children)

Canada has two land borders now. Get with the times!

[–] lungdart@lemmy.ca 1 points 2 years ago

You could always add them to the allow list so they don't get blocked.

[–] lungdart@lemmy.ca 10 points 2 years ago

Sorry to hear that.

[–] lungdart@lemmy.ca 13 points 2 years ago (2 children)

Moving the port doesn't reduce attack surface. It's the same amount of surface.

Tailscale is a bit controversial because it requires a 3rd party to validate connections, a 3rd party that is a large target for threat actors, and is reliant on profitability to stay online.

I would recommend a client VPN like wireguard, or SSH being validated using signed keys against a certificate authority your control, with fail2ban.

[–] lungdart@lemmy.ca 21 points 2 years ago (3 children)

Sounds like you were out of resources. That is the goal of a DoS attack, but you'd need connection logs to detect if that was the case.

DDoS attacks are very tricky to defend. (Source: I work in DDoS defence). There's two sections to defense, detection and mitigation.

Detection is very easy, just look at packets. A very common DDoS attack uses UDP services to amplify your request to a bigger response, but then spoof your src ip to the target. So large amounts of traffic is likely an attack, out of band udp traffic is likely an attack. And large amount of inband traffic could be an attack.

Mitigation is trickier. You need something that can handle a massive amount of packet inspection and black holing. That's done serious hardware. A script kiddie can buy a 20Gbe/1mpps attack with their moms credit card very easily.

Your defence options are a little limited. If your cloud provider has WAF, use it. You may be able to get rules that block common botnets. Cloudflare is another decent option, they'll man in the middle your services, and run detection and mitigation on all traffic. They also have a decent WAF.

Best of luck!

[–] lungdart@lemmy.ca 8 points 2 years ago (2 children)
view more: ‹ prev next ›