<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>System Administration on System Overlord</title><link>https://systemoverlord.com/tags/system-administration.html</link><description>Recent content in System Administration on System Overlord</description><generator>Hugo</generator><language>en-us</language><managingEditor>david@systemoverlord.com (David Tomaschik)</managingEditor><webMaster>david@systemoverlord.com (David Tomaschik)</webMaster><lastBuildDate>Sat, 03 Mar 2018 00:00:00 +0000</lastBuildDate><atom:link href="https://systemoverlord.com/tags/system-administration/index.xml" rel="self" type="application/rss+xml"/><item><title>OpenSSH Two Factor Authentication (But Not Service Accounts)</title><link>https://systemoverlord.com/2018/03/03/openssh-two-factor-authentication-but-not-service-accounts.html</link><pubDate>Sat, 03 Mar 2018 00:00:00 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2018/03/03/openssh-two-factor-authentication-but-not-service-accounts.html</guid><description>&lt;p&gt;Very often, people hear &amp;ldquo;SSH&amp;rdquo; and &amp;ldquo;two factor authentication&amp;rdquo; and assume you&amp;rsquo;re
talking about an SSH keypair that&amp;rsquo;s got the private key protected with a
passphrase. And while this is a reasonable approximation of a two factor
system, it&amp;rsquo;s not &lt;em&gt;actually&lt;/em&gt; two factor authentication because the server is not
using two separate factors to authenticate the user. The only factor is the SSH
keypair, and there&amp;rsquo;s no way for the server to know if that key was protected
with a passphrase. However, OpenSSH has supported true two factor
authentication for nearly 5 years now, so it&amp;rsquo;s quite possible to build even more
robust security.&lt;/p&gt;</description></item><item><title>PSA: Typos in mkfs commands are painful</title><link>https://systemoverlord.com/2014/10/20/psa-typos-in-mkfs-commands-are-painful/</link><pubDate>Mon, 20 Oct 2014 14:19:40 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2014/10/20/psa-typos-in-mkfs-commands-are-painful/</guid><description>&lt;p&gt;TL;DR: I apparently typed &lt;code&gt;mkfs.vfat /dev/sda1&lt;/code&gt; at some point. Oops.&lt;/p&gt;
&lt;p&gt;So I rarely reboot my machines, and last night, when I rebooted my laptop (for graphics card weirdness) Grub just came up with:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Error: unknown filesystem.
grub rescue&amp;gt;
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;WTF, I wonder how I borked my grub config? Let&amp;rsquo;s see what happens when we ls my /boot partition.&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;grub rescue&amp;gt;ls (hd0,msdos1)
unknown filesystem
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;Hrrm, that&amp;rsquo;s no good. An &lt;code&gt;ls&lt;/code&gt; on my other partition isn&amp;rsquo;t going to be very useful, it&amp;rsquo;s a LUKS-encrypted LVM PV. Alright, time for a live system. I grab a Kali live USB (not because Kali is necessarily the best option here, it&amp;rsquo;s just what I happen to have handy) and put it in the system and boot from that. &lt;code&gt;file&lt;/code&gt; tells me its an &lt;code&gt;x86 boot sector&lt;/code&gt;, which is not at all what I&amp;rsquo;m expecting from an ext4 boot partition. It slowly dawns on me that at some point, intending to format a flash drive or SD card, I must&amp;rsquo;ve run &lt;code&gt;mkfs.vfat /dev/sd&lt;/code&gt;&lt;strong&gt;&lt;code&gt;a&lt;/code&gt;&lt;/strong&gt;&lt;code&gt;1&lt;/code&gt; instead of &lt;code&gt;mkfs.vfat /dev/sd&lt;/code&gt;&lt;strong&gt;&lt;code&gt;b&lt;/code&gt;&lt;/strong&gt;&lt;code&gt;1&lt;/code&gt;. That one letter makes all the difference. Of course, it turns out it&amp;rsquo;s not even a valid FAT filesystem&amp;hellip; since the device was mounted, the OS had kept writing to it like an ext4 filesystem, so it was basically a mangled mess. &lt;code&gt;fsck&lt;/code&gt; wasn&amp;rsquo;t able to restore it, even pointing to backup superblocks: it seems as though, among other things, the root inode was destroyed.&lt;/p&gt;</description></item><item><title>The Machine Inside the Machine</title><link>https://systemoverlord.com/2014/05/13/the-machine-inside-the-machine/</link><pubDate>Tue, 13 May 2014 04:24:00 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2014/05/13/the-machine-inside-the-machine/</guid><description>&lt;p&gt;Imagine this scenario:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;One of your employees visits a site offering a program to download videos from a popular video site. Because they&amp;rsquo;d like to throw some videos on their phone, they download and install it, but it comes with a hitchhiker: a RAT, or remote access trojan. So Trudy, an attacker, has a foothold, but the user isn&amp;rsquo;t an administrator, so she starts looking at the network for a place to pivot. Scanning a private subnet, she finds a number of consecutive IP addresses all offering webservers, FTP servers, and even telnet! Connecting to one, the attacker suddenly realizes she has just found her golden ticket&amp;hellip;&lt;/p&gt;</description></item></channel></rss>