Edit History Actions Discussion

Diff for "Info/Security"

Differences between revisions 11 and 12
Revision 11 as of 2009-07-07 16:59:45
Size: 2256
Editor: marco
Comment: grammar and rephrasing
Revision 12 as of 2011-01-16 19:05:08
Size: 2040
Editor: independence
Comment:
Deletions are marked like this. Additions are marked like this.
Line 1: Line 1:
## page was renamed from Security
Line 6: Line 5:
The shell server only accepts encrypted logins. For SSH, only protocol v2 is allowed. The shell server only accepts encrypted logins via [[SSH]] (only protocol version 2 is allowed). Make sure to chech the key fingerprint the first time you log in via SSH: [[Info/SSH_Servers|SSH Server Fingerprints]].
Line 8: Line 7:
Normal non-encrypted FTP is not supported, instead SFTP from the OpenSSH package is used to transfer files to and from the shell server. Normal non-encrypted FTP is not supported, instead [[SFTP]] from the OpenSSH package is used to transfer files to and from the shell server.
Line 10: Line 9:
Sensitive webpages such as phpMyAdmin and Webmail are only available over HTTPS. The certificate is a Class 3 certificate from CAcert. If you do not have CAcert's root certificate installed in your browser, follow these instructions to get it: http://wiki.cacert.org/wiki/BrowserClients Sensitive webpages such as phpMyAdmin and Webmail are only available over HTTPS, and the wiki and blog are optionally available over HTTPS. The certificate is signed by CAcert, which is not included by default in most browsers. Instead you have to install the CAcert root certificate  in your browser: http://wiki.cacert.org/wiki/BrowserClients
Line 26: Line 25:
If you want me to send you emails encrypted or signed with PGP, that's no problem, just ask.

You can download my OpenPGP public key signature on my personal page: JohanMarcusson. You can not ''fully'' trust this however, since you downloaded it over the internet. But I'll make sure that no one else publishes an OpenPGP signature on this website trying to say it's mine.
Line 33: Line 28:

Security

Here you can find some general information and pointers about security in general and more specifically Blinkenshell.

Encryption

The shell server only accepts encrypted logins via SSH (only protocol version 2 is allowed). Make sure to chech the key fingerprint the first time you log in via SSH: SSH Server Fingerprints.

Normal non-encrypted FTP is not supported, instead SFTP from the OpenSSH package is used to transfer files to and from the shell server.

Sensitive webpages such as phpMyAdmin and Webmail are only available over HTTPS, and the wiki and blog are optionally available over HTTPS. The certificate is signed by CAcert, which is not included by default in most browsers. Instead you have to install the CAcert root certificate in your browser: http://wiki.cacert.org/wiki/BrowserClients

Passwords

Do not use the same password for your shell account as you use for other services, especially those that communicate over non-secure protocols like IRC or webpages.

Also, check out our password policy: PasswordPolicy

Phishing and trust

No one at Blinkenshell will ever ask you for your password. Do not ever give away your password, not even to someone saying he/she is an admin.

On IRC, there often is no really good way to protect your nickname, so anyone can use anyone else's nickname. Don't trust someone to be an admin just because of the username. Check things like connecting host and if the user is identified with NickServ.

Emails can be sent from addresses other than one's own, so don't trust emails asking you to reply with your password or similar just because the sender address is from a trusted domain.

Use common sense and a certain ammount of paranoia and you will be all right :-)

Read more


CategoryInfo