Summary In this blog we explore how to use certificates from Let’s Encrypt to secure self-hosted Bamboo and Crucible. Process To Follow Install Certbot Ensure that external DNS resolves to the correct IP addressping example.yourdomain.com Ensure that Port 80 is open from the outside to that IP address so that Let’s Encrypt can validate the […]
In order to get rsync to have access to the hard drive in macOS Ventura, you need to add rsync and other programs to the Full Disk Access panel under Privacy […]
Apache 2.4 changed the security configuration directives a bit. Here is an example using basic auth:
1
2
3
4
5
6
7
8
9
10
11
12
13
14
<Directory"/path/to/your/wordpress">
AllowOverride All
Options+FollowSymLinks+ExecCGI-Indexes
Order allow,deny
Allow from all
<RequireAll>
AuthType Basic
AuthName"Protected Resource"
AuthUserFile/path/to/your/.htpasswd
Require valid-user
</RequireAll>
</Directory>
What tripped me up for a while was that I still had the Require all granted directive inside the container, and that needed to be removed for the auth to work.
Summary TLS heartbeat read overrun (CVE-2014-0160) – A missing bounds check in the handling of the TLS heartbeat extension can be used to reveal up to 64k of memory to a connected client or server. OpenSSL Versions Affected The 1.0.1 and 1.0.2-beta releases of OpenSSL are affected including 1.0.1f and 1.0.2-beta1. OpenSSL 1.0.2-beta through 1.0.2-beta1 […]
The kernel runs with five different security levels. Any super-user process can raise the level, but no process can lower it. The security levels are: -1: Permanently insecure mode – always run the system in insecure mode. This is the default initial value. 0: Insecure mode – immutable and append-only flags may be turned off. All devices may be […]