Skip to main content

Posts

2012


Google Authenticator F5 IRule

·948 words·5 mins
Two Factor authentication is rather hit and miss in terms of support from web apps.

2011


Yubikey and server authentication

·359 words·2 mins
After starting to use the Yubikey for LastPass and various other online servers I’ve started also using my yubikey for SSH access to my server(s).

PAM and Two Factor authentication

·293 words·2 mins
As the need for Two factor authentication is a requirement for PCI-DSS (Payment Card Industry standard) and SSH Key with password is not always deemed to be an acceptable form of Two factor authorisation there is now a surge in different forms of two factor auth, all with their own pros and cons.

Auditd logging all commands

·228 words·2 mins
A common requirement for PCI-DSS is for all commands run by a user who has admin privileges to be logged.

Moving part of an lvm vg from one pv to another

·338 words·2 mins
Lets say that you’ve got multiple physical volumes (PV) in a Volume Group (VG) and you want to migrate the extents from one PV to another, this can be acomplished with a quick and easy pvmove command.

Dahdi In LXC

·442 words·3 mins
At home we use various VoIP providers to either get free calls to various places (GTalk/GVoice to america for instance) and various other destinations over SIP providers

2010


2009


IRSSI Prowl Notifications

·254 words·2 mins
A quick script to send notifications from IRSSI for privmessages and also for highlights, I’ll put more commentary on later, but for now.

RouterBoard as a Home Router - 7 Months on Part 1

·776 words·4 mins
At the new year I decided that I was fed up with having my main Unix server acting as a Router (amongst other things) and decided to bite the bullet and get a full blown router.