ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login
    1. Topics
    2. JaredBusch
    3. Best
    • Profile
    • Following 0
    • Followers 44
    • Topics 969
    • Posts 29,707
    • Groups 1

    Posts

    Recent Best Controversial
    • RE: Password manager options for multi-user?

      @Kelly said in Password manager options for multi-user?:

      @JaredBusch said in Password manager options for multi-user?:

      @Kelly said in Password manager options for multi-user?:

      There it is. Secret server from Thycotic: https://thycotic.com/solutions/free-it-tools/secret-server-free/.

      /wtb pricing

      Their not free tool has a ton of PAM features that aren't in most password managers so I'm guessing that it isn't cheap. But, like so many vendors, you have to give them your contact info to get the basics it looks like.

      Our company use would fit in the free tool and I will probably try it out as it looks nice.

      But I hate request a quote shit..

      posted in IT Discussion
      JaredBuschJ
      JaredBusch
    • Upgrading Nextcloud via CLI

      The built in Nextcloud GUI updater works decent. But even their documentation says to use the CLI updater for larger installs to prevent timeout issues.

      Since version 15 finally was available in the stable channel a while back I made a guide while I was performing the update.

      For the purposes of this guide, we are going to assume that you are running Nextcloud version 12+ and you are running it on Fedora.

      Log in to the command line and switch to the root user

      sudo su -
      

      Disable SELinux temporarily

      setenforce 0
      

      Change to the Nextcloud directory appropriate to the install

      # default location
      cd /var/www/html/nextcloud
      

      Put Nextcloud in maintenance mode

      sudo -u apache php occ maintenance:mode --on
      

      Make a snapshot of your VM

      I always make the snapshot at this point because once it is in maintenance mode, no new changes will be accepted.
      So if things go to hell and you need to revert, there will be no conflict files.

      Run the updater.

      sudo -u apache php updater/updater.phar
      

      It will display this for an update

      c3c613f7-a546-4aa7-8af8-c3caab2de351-image.png

      Answer yes and it will perform the update.

      2238abaf-0ae0-413c-8f98-0d8b58bd07f0-image.png

      Tell it no when asked to run the occ upgrade command.

      I have had issue with answering yes this step in the past and just never let tit do it anymore. Someday, when I have free time, I will test this out again.
      c7dec9b0-436c-4ed0-8219-d6d6ca875157-image.png

      Run the occ upgrade command.

      sudo -u apache php occ upgrade
      

      d9ed39b4-e9c2-4dbd-8b11-4bf0fcc660af-image.png
      42925345-bfdc-4039-b847-22ae3bb8572a-image.png

      Turn maintenance mode back off.

      sudo -u apache php occ maintenance:mode --off
      

      Turn SELinux back on.

      setenforce 1
      

      Exit from the root user.

      exit
      

      Verify the update is successfully reflected in the web interface

      1e739674-8175-41e2-9310-87d2bbcff8cf-image.png

      Perform any follow up tasks now listed in the warnings section.

      8577e4c1-23fd-404c-96c7-47911f387f9e-image.png

      posted in IT Discussion nextcloud upgrade cli fedora nextcloud upgrade
      JaredBuschJ
      JaredBusch
    • Installing MS SQL Server Express on CentOS

      Microsoft makes this super easy, and @scottalanmiller has posted about this once back in 2017.

      First, as always when I write something, start with the minimal install. In this case, of CentOS 7, as Microsoft only supports the LTS model of operating systems. Their listed Ubuntu version is old. Also, you all know how much I love Ubuntu.

      Second, make sure your system is fully up to date.

      yum update -y
      

      Note: You do not need the EPEL.

      Now you are ready to go.

      Go get the SQL Server repository from Microsoft.

      sudo curl -o /etc/yum.repos.d/mssql-server.repo https://packages.microsoft.com/config/rhel/7/mssql-server-2017.repo
      

      09a75873-054e-4bcc-8dac-4dbb0e30a1e2-image.png

      Install SQL Server with yum

      sudo yum install -y mssql-server
      

      71021738-5f72-480e-911d-5e8aa0b2bf9c-image.png
      ef789857-6b2b-450a-a69c-5e411021945e-image.png
      799dd414-9b57-4a65-b0c3-7e74bc31d91f-image.png

      Then as instructed run the setup wizard.

      sudo /opt/mssql/bin/mssql-conf setup
      

      You will be prompted to choose your version.

      Choose the version you want. For this guide we are selecting 3) Express.
      9c576fe9-8688-41e9-9c10-5ebc1fe295c7-image.png

      You will then have to agree to the license terms.

      7f359111-3e30-4614-91a7-ca28376942d1-image.png

      Now enter the sa user password you want for SQL Server

      The sa account is equivalent to the root account in MariaDB/MySQL
      7287f8f7-f5b7-4665-9dc3-89c155f64313-image.png

      You should see it was successfully completed.

      That's it, you are up and running.
      cc42f5df-8c10-4e89-83f8-0bf98c904bbe-image.png

      While you may be up and running now, you will also need to do a few more things to make it useful.

      Allow inbound connections through the firewall to the server if needed.

      In my case, I will have a remote server talking to this and I use Azure Data Studio form a Linux Desktop to access this.

      sudo firewall-cmd --zone=public --add-port=1433/tcp --permanent
      sudo firewall-cmd --reload
      

      a0c10123-0fc7-4d23-8502-071c5b16a9de-image.png

      Add the Microsoft command line tools so you can locally manage the instance.

      This is a separate repository file from SQL Server itself.

      sudo curl -o /etc/yum.repos.d/msprod.repo https://packages.microsoft.com/config/rhel/7/prod.repo
      

      381b6250-c38f-4679-9aa9-b597105fcaea-image.png

      Install the tools.

      sudo yum install -y mssql-tools unixODBC-devel
      

      55feba92-5281-449a-8476-d26b4f81f187-image.png

      There are again license agreements to be agreed to.
      883222a1-3acc-460b-83e1-5480fcd5d68d-image.png

      If you want to use the tools without typing the full bath, add them to your path.

      echo 'export PATH="$PATH:/opt/mssql-tools/bin"' >> ~/.bash_profile
      echo 'export PATH="$PATH:/opt/mssql-tools/bin"' >> ~/.bashrc
      source ~/.bashrc
      

      You now have access to sqlcmd
      46f52682-b31d-4e03-8599-387a6391785c-image.png

      You can connect to the local instance like this. You will be prompted for your password.

      sqlcmd -U sa
      

      dc8ea2bc-2efc-4b90-86e3-45c9c944645f-image.png

      You can pass the password with the -P parameter.

      sqlcmd -U sa -P 'YourSuperSecretPassword'
      

      Note the single quotes. I always use them to ensure even if you have a special character, that the password is accepted when passed this way.
      314852b3-fbaf-4a60-a757-16c9ff967fb0-image.png

      posted in IT Discussion linux centos centos 7 rhel database ms sql server ms sql server 2017 linux ms sql server 2017 guide how to
      JaredBuschJ
      JaredBusch
    • RE: File sync and storage issue.

      Two way sync for something like this is a horrible design.

      What they should use is a file drop method to upload files from the field and never download anything.

      The field techs have zero need for this data right? Make them use the web interface.

      Filedrop:
      e403bb99-3397-4f2f-bd94-23151cd250b4-image.png

      Or let them see/delete what they uploaded, but disable downloads:
      a0709419-5f0c-4afd-9c48-b1908bcf818e-image.png

      Then the office workers will MOVE the file to a different location when they process the file and put it into the database. So this keeps the field tech view clean.

      posted in IT Discussion
      JaredBuschJ
      JaredBusch
    • RE: NGINX vs Apache

      Assuming you are just spinning up a web server for content? no.

      Almost no normal site will encounter any of the differences in the two web server stacks.

      If you are spinning up an application like Nextcloud, that supports both choices, go with the default choice of the developers.

      For Nextcloud, that is Apache. Not that Nginx doesn't work, because it does. But just because that is what the developers use.

      posted in IT Discussion
      JaredBuschJ
      JaredBusch
    • RE: Secure Meshcentral server on Vultr

      @pmoncho said in Secure Meshcentral server on Vultr:

      @JaredBusch
      Thanks. That is what I was thinking. I just read read and read more but I have not been a security through obscurity kinda person.

      When it comes to the internet, there is no such thing as security through obscurity.

      No one is looking at this shit. It is bots and they don't care WTF port they find open.

      There absolutely are bots out there attempting to open connections to every port on every IP.

      There are exactly 2 things that changing the port does.

      1. It reduces the hits, so you will have smaller logs of hits, but it is only a reduction. Once one of the bots finds it, your IP goes on a list and is resold.
      2. It causes you to fucking cuss at yourself everytime you forget to use the "random" port you selected.
      posted in IT Discussion
      JaredBuschJ
      JaredBusch
    • RE: How can I show disk IO in glances

      So the real solution will be wait for python3-psutil to update in the fedora base repo. Currently it is still at 5.4.3.

      [root@nextcloud ~]# dnf list *psutil*
      Last metadata expiration check: 0:03:01 ago on Mon 18 Mar 2019 04:05:03 PM CDT.
      Installed Packages
      python3-psutil.x86_64                                                       5.4.3-6.fc29                                     @fedora
      

      Use the above workaround if needed until then.

      posted in IT Discussion
      JaredBuschJ
      JaredBusch
    • RE: Make Simple User Passwords

      @scottalanmiller said in Make Simple User Passwords:

      Ever need to make passwords for users and, let's face it, in the real world a lot of customers demand some pretty silly simply passwords. Using password generators often results in passwords that customers will not (and maybe cannot) use. A ridiculous situation, obviously, but it is reality. Passwords are simply difficult to often pass on to someone.

      When generating temporary passwords, having something super strong is rarely very important. But avoiding something too hard to be used is needed. But just making up something non-random or even non-unique is really bad.

      What's a compromise?

      https://www.dinopass.com/

      Yup, here is reality. Sometimes children's tools just make more sense when, well, you can draw your own conclusions.

      I use CHBS
      http://correcthorsebatterystaple.net/

      1335539d-360c-48f7-83a1-3e3a03adbf45-image.png

      posted in IT Discussion
      JaredBuschJ
      JaredBusch
    • Apparently the 2.0 line of EdgeOS now supports ZeroTier

      ZeroTier works on ER-X 2.x

      curl -s https://install.zerotier.com/ | sudo bash
      sudo /var/lib/zerotier-one/zerotier-cli join YourNetworkIDHere
      
      posted in IT Discussion edgeos edgeos 2.0.0 zerotier
      JaredBuschJ
      JaredBusch
    • Backblaze Q1 2019 stats published

      Backblaze Hard Drive Stats Q1 2019

      posted in IT Discussion backblaze backblaze b2 statistics
      JaredBuschJ
      JaredBusch
    • RE: Unable to log in to Cinnamon after installing Deepin

      Dropped to alternate shell with Ctrl+Alt+F2.

      sudo dnf group remove "Cinnamon Desktop"
      sudo dnf group install "Cinnamon Desktop"
      sudo dnf group remove "Deepin Desktop"
      sudo dnf group install "Cinnamon Desktop" # this installed 26 packages
      reboot
      

      Cinnamon Desktop usable again

      posted in IT Discussion
      JaredBuschJ
      JaredBusch
    • What is content ownership

      Found this today.

      Thoughts on content ownership and long, meaningful discussions

      By @julian

      posted in IT Discussion
      JaredBuschJ
      JaredBusch
    • SSH Hardening

      What do you do beyond disable root and require keys? Anything?

      Normally, this is all I do with /etc/ssh/sshd_config

      PermitRootLogin no
      PubkeyAuthentication yes
      PasswordAuthentication no
      

      This is for a system with port 22 available on the public internet. Obviously fail2ban is in place.

      This is my typical bundy_jail.local sshd section.

      [sshd]
      # To use more aggressive sshd modes set filter parameter "mode" in jail.local:
      # normal (default), ddos, extra or aggressive (combines all).
      # See "tests/files/logs/sshd" or "filter.d/sshd.conf" for usage example and details.
      #mode   = normal
      port    = ssh
      logpath = %(sshd_log)s
      backend = %(sshd_backend)s
      enabled = true
      action = %(action_mw)s
      
      posted in IT Discussion ssh sshconfig hardening security fail2ban jumpbox
      JaredBuschJ
      JaredBusch
    • RE: BitTorrent/P2P technology for distributed file transfer of large files?

      You certain can do this.

      Use whatever your preferred BitTorrent client is.

      Put your files where you want them in system one.

      Crate a new torrent in the client with all of the files. Or a torrent per file or whatever.

      Save the torrent file and start seeding.

      Distribute the torrent file to systems two through X and start downloading.

      The process will speed up as each system gets pieces.

      posted in IT Discussion
      JaredBuschJ
      JaredBusch
    • RE: How do I replace one Domain Controller server with another and keep IP address?

      Migrate FSMO to DC2, Demote DC1, Disjoin DC1 from domain, Shutdown DC1.

      Cleanup DC1 references.

      Spin up new DC3 using IP of DC1.

      posted in IT Discussion
      JaredBuschJ
      JaredBusch
    • RE: Windows Offline files won't sync

      I don't even bother to try anymore.

      • Make a copy outside of sync location.
      • delete form sync location and hidden sync location
      • make sure folder in solid sync
      • put file back
      posted in IT Discussion
      JaredBuschJ
      JaredBusch
    • RE: Skyetel tenant functionality

      Well, the month rolled, and so I now have a report.

      The tenant report is awesomely detailed for those that actually care about sending something on to a client.

      In my use case, the client just needed location specific break out, so I only care about the totals. But OMFG the awesomeness of the numbers....

      Great work on this part @Skyetel

      20190904_091007.png

      posted in IT Discussion
      JaredBuschJ
      JaredBusch
    • RE: TPM module - what is it used for?

      @Dashrender said in TPM module - what is it used for?:

      @black3dynamite said in TPM module - what is it used for?:

      I know with a Windows 10 desktop using Bitlocker, TPM makes it possible for us to not have to enter a password to boot into Windows. I do believe Hyper-V also utilize TPM has well.

      Not using a password to unlock the TPM seems to make that situation almost, I'm saying almost, pointless.

      No, the point is to tie bitlocker to that physical hardware. That is not useless.

      If you pull the drive, then you will not be able to decrypt it. It is not supposed to be the be all, end all of security.

      posted in IT Discussion
      JaredBuschJ
      JaredBusch
    • RE: Co-lo + 5 (or more) sites....connect 'em all

      @FATeknollogee said in Co-lo + 5 (or more) sites....connect 'em all:

      @scottalanmiller said in Co-lo + 5 (or more) sites....connect 'em all:

      @FATeknollogee said in Co-lo + 5 (or more) sites....connect 'em all:

      @scottalanmiller said in Co-lo + 5 (or more) sites....connect 'em all:

      @FATeknollogee said in Co-lo + 5 (or more) sites....connect 'em all:

      Hmmm...is this an option...? https://www.tnsr.com/

      An option in general? Sure, it's just a vRouter that does IPsec. I'm sure it is good, but you can't run it on an EdgeRouter because it's an OS.

      One would have to switch to pfSense if TNSR is a viable option.

      I guess the real question I'd have is... why? What about TNSR makes it interesting in any way? Aren't you just looking at replacing tried and true, built in IPSec implementations with this complicated package that is just repacking OpenSwan?

      I'm confused what you are trying to achieve. Connecting 5+ sites is the absolute clear use case for normal everyday IPSec on your outside hardware router. This is as "by the textbook" as it gets.

      Can you use other VPN tech for this like OpenVPN, yes. Should you? Not really, it has no benefits to you. IPSec is best for this for speed, support, ease of use.

      This is not a case where ZT has applicability unless you have needs that haven't been mentioned. Same with TNSR, what would this do other than make simple IPSec really hard and complicated for no reason?

      This feels like one of those Aaron threads where he's captivated by all kinds of shiny product pages and misses that he's trying to do something very straightforward that is handled best by the tools that everyone uses for this every day. I'm missing what is driving the attempt to research new, hip, flashy products as none of them seem to bring anything to this particular table.

      The claimed speeds is what caught my attention.
      TNSR "claims" they can do High Speed Site-to-Site IPsec VPN
      "TNSR provides secure high-speed routing solutions at 1, 10, 40, 100 Gbps, and beyond - at a fraction of the price of alternatives."

      Any vRouter should be able to do this though. All you need for any IPSEC solution is enough offloaded processing power to handle the chosen encryption level.

      posted in IT Discussion
      JaredBuschJ
      JaredBusch
    • RE: Edgerouter using BGP and setting up a guest network

      If you don't care what IP your guest network shows to the public, you should be able to do this.

      You should simply need to create a source NAT rule for the traffic.

      At various locations, I have fiber services delivered without an ISP router from the carriers. Part of that service is also a /29 block of IP addresses.

      What I do in those instances is put the /30 public IP that would normally be on the ISP router on my router, then I create source and destination rules to handle the traffic.

      ISP Assigned Router IP: 123.123.123.190/30
      Routed IP block: 123.122.122.138/29

      eth0 = WAN 123.123.123.190/30
      eth3 = LAN 10.200.0.1/23
      eth3.10 = Public Wifi 10.200.10.1/24

      set interfaces ethernet eth0 address 123.123.123.190/30
      set interfaces ethernet eth0 description 'AT&T FIber'
      set interfaces ethernet eth0 duplex full
      set interfaces ethernet eth0 firewall in name WAN_IN
      set interfaces ethernet eth0 firewall local name WAN_LOCAL
      set interfaces ethernet eth0 speed 100
      set interfaces ethernet eth3 address 10.200.0.1/23
      set interfaces ethernet eth3 description 'LAN'
      set interfaces ethernet eth3 duplex auto
      set interfaces ethernet eth3 firewall in name LAN_IN
      set interfaces ethernet eth3 firewall local name LAN_LOCAL
      set interfaces ethernet eth3 speed auto
      set interfaces ethernet eth3 vif 10 address 10.200.10.1/24
      set interfaces ethernet eth3 vif 10 description 'Guest Wireless'
      set interfaces ethernet eth3 vif 10 firewall in name Public_WiFi_IN
      set interfaces ethernet eth3 vif 10 firewall local name Public_WiFi_LOCAL
      

      Note that I do not assign the routed block to any interface.

      Some firewall rules to prevent talking and such..

      set firewall group address-group 10_0_0_0_8 address 10.0.0.0/8
      set firewall group address-group 10_0_0_0_8 description 'Entire 10.0.0.0/8'
      set firewall group network-group Public_WiFI_LAN description 'Public WiFi LAN'
      set firewall group network-group Public_WiFI_LAN network 10.200.10.0/24
      set firewall name Public_WiFi_IN default-action accept
      set firewall name Public_WiFi_IN description 'Public WiFi in to other interfaces'
      set firewall name Public_WiFi_IN rule 10 action accept
      set firewall name Public_WiFi_IN rule 10 description 'Allow response to existing connections'
      set firewall name Public_WiFi_IN rule 10 log disable
      set firewall name Public_WiFi_IN rule 10 protocol all
      set firewall name Public_WiFi_IN rule 10 state established enable
      set firewall name Public_WiFi_IN rule 10 state invalid disable
      set firewall name Public_WiFi_IN rule 10 state new disable
      set firewall name Public_WiFi_IN rule 10 state related enable
      set firewall name Public_WiFi_IN rule 20 action accept
      set firewall name Public_WiFi_IN rule 20 description 'Allow access to gateway'
      set firewall name Public_WiFi_IN rule 20 destination group address-group ADDRv4_eth3.10
      set firewall name Public_WiFi_IN rule 20 log disable
      set firewall name Public_WiFi_IN rule 20 protocol all
      set firewall name Public_WiFi_IN rule 30 action drop
      set firewall name Public_WiFi_IN rule 30 description 'Block all other access to private networks'
      set firewall name Public_WiFi_IN rule 30 destination group address-group 10_0_0_0_8
      set firewall name Public_WiFi_IN rule 30 log disable
      set firewall name Public_WiFi_IN rule 30 protocol all
      set firewall name Public_WiFi_IN rule 40 action drop
      set firewall name Public_WiFi_IN rule 40 description 'Block all SMTP'
      set firewall name Public_WiFi_IN rule 40 destination port 25
      set firewall name Public_WiFi_IN rule 40 log enable
      set firewall name Public_WiFi_IN rule 40 protocol tcp
      set firewall name Public_WiFi_LOCAL default-action drop
      set firewall name Public_WiFi_LOCAL description 'Public WiFi in to router'
      set firewall name Public_WiFi_LOCAL rule 10 action accept
      set firewall name Public_WiFi_LOCAL rule 10 description 'Allow DNS'
      set firewall name Public_WiFi_LOCAL rule 10 destination port 53
      set firewall name Public_WiFi_LOCAL rule 10 log enable
      set firewall name Public_WiFi_LOCAL rule 10 protocol udp
      set firewall name Public_WiFi_LOCAL rule 50 action accept
      set firewall name Public_WiFi_LOCAL rule 50 description 'Allow pings'
      set firewall name Public_WiFi_LOCAL rule 50 limit burst 1
      set firewall name Public_WiFi_LOCAL rule 50 limit rate 62/minute
      set firewall name Public_WiFi_LOCAL rule 50 log enable
      set firewall name Public_WiFi_LOCAL rule 50 protocol icmp
      

      Then I use NAT rules to specify how it routes out. I do not have a destination NAT rule here because there is no inbound traffic allowed. the NAT translation should handle the return traffic.

      In your case, you could just tell it to use the IP on the WAN interface instead of some other IP.

      set service nat rule 5995 description 'Outbound Public WiFi LAN Traffic'
      set service nat rule 5995 log disable
      set service nat rule 5995 outbound-interface eth0
      set service nat rule 5995 outside-address address 123.122.122.140
      set service nat rule 5995 protocol all
      set service nat rule 5995 source group network-group Public_WiFI_LAN
      set service nat rule 5995 type source
      
      posted in IT Discussion
      JaredBuschJ
      JaredBusch
    • 1
    • 2
    • 16
    • 17
    • 18
    • 19
    • 20
    • 629
    • 630
    • 18 / 630