Using ssh agent for sudo authentication on debian

Using this ubuntu guide with 2 changes. 1. Change the configure line to ./configure –libexecdir=/lib/x86_64-linux-gnu/security/ –with-mantype=man 2. Instead of editing the sudoers file, create a file under sudoers.d (more modular): echo “Defaults env_keep += SSH_AUTH_SOCK” > /etc/sudoers.d/ssh_auth Also note that the latest version of this module on sourceforge is more recent than linked.

Cleaning up repos in cobbler

Here’s a cobbler snippet that disables the default repomirror (presuming you are serving the rpms yourself) and adds the updates channel # disable Centos Base Repo (get updates elsewhere) sed -i -e ‘s/^/#/g’ /etc/yum.repos.d/CentOS-Base.repo # download updates repo file wget -O – http://$http_server/cobbler/repo_mirror/Centos6-UPDATES/config.repo > /etc/yum.repos.d/Centos6-Updates.repo sed -i -e ‘s/\${http_server}/$http_server/’ /etc/yum.repos.d/Centos6-Updates.repo Change the name of the …

Continue reading ‘Cleaning up repos in cobbler’ »

cliget :: Add-ons for Firefox

Download files using curl or wget. This addon generates curl/wget commands that emulate the request as though it’s coming from your browser allowing you to download protected files directly to a separate machine (e.g. server). via cliget :: Add-ons for Firefox. Very useful for downloading ISOs directly to your server that you have to log …

Continue reading ‘cliget :: Add-ons for Firefox’ »

SSH’ing via a gateway host using Putty

(or Kitty to be more exact, which is Putty on steroids) 1. Set up key authentication to your host with PuttyGen & Pageant (ssh-agent for Putty) – or KittyGen & Kageant if you’re using Kitty. Paste your public key into authorized_hosts on the gateway & destination box. 2. Set up your configuration, IP address in …

Continue reading ‘SSH’ing via a gateway host using Putty’ »

OpenSSL / CVE-2014-0160

The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug. via CVE …

Continue reading ‘OpenSSL / CVE-2014-0160’ »