IRC log of #novawebdev for Tuesday, 2024-09-24

*** mulbah07 has quit (Remote host closed the connection)01:57
*** mulbah07 has quit (Remote host closed the connection)03:03
ubuntouristACTION tries to open his eyes while waiting for the caffeine to kick in...13:29
ubuntouristGood day mulbah07. How goes your recovery and general health?13:30
mulbah07sure Mr. Cole13:34
ubuntouristAre you recovered from your recent illness?13:34
mulbah07Yeah Mr. Cole13:35
ubuntouristI confess I still have not been reading as much as I should and don't have any specific tasks or challenges. But...13:36
ubuntourist... I do have one idea:13:36
ubuntouristThere is a "game" designed for systems administors and computer security people called "Capture the Flag".13:37
ubuntouristIt is sometimes abbreviated as "CtF".  The name comes from a children's game with the same name.13:38
ubuntouristIn the computer security version, you are presented with a virtual machine that you must break into.13:39
ubuntouristAfter you successfully break into a machine, you break into another, and another. Each virual machine has better and better13:40
ubuntouristsecurity, making it harder and harder to break into.13:40
ubuntouristIt's done via the web and one popular site for the games is13:41
ubuntouristhttps://overthewire.org/wargames/13:41
ubuntouristIn the US, some hackers make these events group parties. People bring a bit of snacks and drinks, and solve these puzzles 13:43
ubuntouristtogether.13:43
ubuntouristACTION is done13:43
mulbah07I'm trying to read on the link13:46
mulbah07so that is a game for linux sysadmin13:48
ubuntouristWell, it is for anyone interested in keeping their servers secure. That person is often the sysdadmin.13:49
mulbah07oh okay13:50
ubuntouristIt also teaches diagnostic skill: Players are presented with puzzles and have to do a bit of research to figure out how to solve them.13:51
ubuntouristI have only played the first game "Bandit".13:51
ubuntouristSo, any questions for me or things that you would like to demonstrate?13:53
mulbah07you side you haven't been reading the book13:54
ubuntouristYeah. I am a bad student. 😉13:55
ubuntouristMy hope was that, whenever you had specific questions I would be able to either13:56
ubuntouristanswer directly or flip open the book and skim quickly and then answer.13:57
mulbah07oh okay13:57
ubuntouristA lot of what is in the book is designed to give you an intuition and instinct for the way everything13:57
ubuntouristworks. You won't be needing all 900 pages every day. That is why I have forgotten13:58
ubuntouristmuch of what is in the book: Some of it is very rarely needed. Either you set up something correctly,13:59
ubuntouristand leave it alone for years at a time, or, there is some sudden crisis that you need to resolve, and you resolve it.14:00
mulbah07can we go over chapter 10 Administering users and groups14:00
ubuntouristTalk to your fellow co-op members a lot to see what things they might want to have on the server.14:00
ubuntouristOK. Sure. I'm pretty comfortable with administering users and groups/ Ask away!14:01
ubuntouristACTION waits14:06
mulbah07I want to understand how PAM (Pluggable Authentication Modules) integrates with user management, and what are the best practices for securing PAM configuration files14:07
ubuntouristWow! I haven't used PAM in decades! Let me do a quick skim...14:09
ubuntouristIf I recall correctly, pam is used to set limits on what users or groups of users can do.14:10
ubuntouristFor example, you may want to limit the amount of memory that can be manipulated by some users.14:11
ubuntouristThe idea is that each user has a means of proving that they are allowed to do something. They are "authenticated" and authorized14:14
ubuntouristin ways that grant permissions to do some functions, but not others. It also sets policies for what is required to authenticate.14:15
ubuntouristFor example, rules about password length and what characters must be in a password.14:16
ubuntouristSecuring the PAM files? Well, usually the initial installation does a pretty good job, by setting14:18
ubuntouristthe ownership and permissions of the files.14:18
ubuntouristAs with most files in /etc/ the files are owned by root,14:21
ubuntouristand readable by all users, but only root can write to them.14:21
ubuntouristIf you have not already done so, you could look ahead to Chapter 16 for the PAM stuff 14:25
ubuntouristand then come back to Chapter 10.14:25
ubuntouristAlso talk with Jeff and your current sysadmin -- whoever is maintaining your public Jetro Web Development site:14:26
mulbah07alright14:27
ubuntouristIf it will not cost too much, you might be able to set up a virtual machine that other members of your team can access.14:27
ubuntouristThat way, they can try to break stuff that you need to fix, or they can say to you "Hey, Mr. SysAdmin, can you add this feature to our system?"14:28
ubuntouristYou DON'T want to do that on the REAL site, because if you break it you've ruined the business.14:28
ubuntouristBut if there is somewhere that you can set up a test site that everyone on the team can fool with, it woud be nice.14:29
ubuntouristIt does not even need to be on the internet. It could be a computer at the school or wherever you meet together.14:30
ubuntouristA computer that everyone can access at any time is all you need.14:30
ubuntouristAnd everyone needs to know that you're experimenting with it: They should not expect to keep files there forever.14:32
ubuntouristThey should back up anything they want to keep because tomorrow you might wipe the system and install a new distribution.14:32
ubuntouristACTION is done14:33
ubuntouristACTION needs to step away for a minute14:37
mulbah07alright14:37
ubuntouristACTION is back14:42
ubuntouristI don't know if I'm helping much. Did you have more specific questions?14:43
ubuntouristI guess not. So, see you next week.14:48
*** ubuntourist has quit (Quit: Leaving)14:48
*** mulbah07 has quit (Remote host closed the connection)15:24

Generated by irclog2html.py 2.17.3 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!