S3E7: "Dude, Where's My Cert?"
|Previous Episode||Next Episode|
|S3E6: "The Hubris of Man"||S3E8: "When You Have to Swing Both Ways"|
|Recorded (UTC)||Aired (UTC)||Editor|
|2018-05-23 02:33:16||2018-06-02 17:02:43||"Edita"|
In this episode, we talk about the shortcomings of ZFS on Linux and briefly introduce you to the world of running your own private PKI.
- Rowhammer is back and “better” than ever via Throwhammer.
- We talked about Rowhammer back in S1E14.
- Either all OS devs need to step their reading comprehension game up or Intel can’t write proper documentation.
- From the “we already knew this” department, working from home boosts productivity.
- Seriously, we’ve known this for a while.
- The Secure Data Act seeks to eliminate government-mandated backdoors…
- And the 4th District ruled that warrantless/suspicionless searches of electronic devices at the border are unconstitutional!
- The US Senate voted to overturn the recent FCC changes with regards to Net Neutrality.
- The Signal desktop application had an RCE.
- There have been suspicious covert surveillance devices all around DC, MD, and VA (though this shouldn’t surprise anyone).
Starts at 29m47s.
I was drinking Jefferson’s Reserve bourbon. Paden was drinking Stella. Jthan was drinking FATE Brewing Company’s Laimas Watermelon Kölsch Style Ale (mixed with vodka for “maximum enjoyment”).
- ZFS on Linux
- ZFS sucks for multi-platform infrastructure.
- Running your own PKI (45m17s)
- You can’t use your own PKI for e.g. a website unless you manually import and trust the CA certificate you generate into the browser’s trust store.
- “Trusted” CAs usually bundle with pre-configured trust in various browsers, though.
- Juniper has a better explanation of the process with some pretty good diagrams when it comes to client certificate management.
- There are several engines supporting SSL/TLS; most commonly these are OpenSSL, GnuTLS, and LibreSSL.
- There are several handy ways of interacting with these backend engines.
- There’s a couple tutorials for using the OpenSSL CLI. Here’s one. Here’s another.
- While the use-case may be limited, setting up your own PKI gives you a deeper understanding into what goes on “under-the-hood”.
- Also worth checking out is the ACME protocol.
In this segment, we highlight system administration mistakes. Think of them as the IT equivalent of the Darwin Awards. (57m23s)
Havoc was wrought when it was discovered that plaintext passwords were leaking from a teen monitoring app.
- The echo didn’t show up on the recording — but Jthan and I narrowed it down. It was Paden, and it only exhibited over Mumble. Thank goodness it didn’t show up in the recording!
|Intro||Glitterhater||Computer Music All-stars||click||CC-BY 4.0||Outro||Humming for you||Ema Grace||click||CC-BY 4.0|