Edit History Actions Discussion

Diff for "Info/Security"

Differences between revisions 8 and 12 (spanning 4 versions)
Revision 8 as of 2007-12-16 15:21:13
Size: 2262
Comment: acl
Revision 12 as of 2011-01-16 19:05:08
Size: 2040
Editor: independence
Comment:
Deletions are marked like this. Additions are marked like this.
Line 1: Line 1:
## page was renamed from Security
Line 6: Line 5:
The shell server only accepts encrypted logins. For SSH, only protocol v2 is allowed. The shell server only accepts encrypted logins via [[SSH]] (only protocol version 2 is allowed). Make sure to chech the key fingerprint the first time you log in via SSH: [[Info/SSH_Servers|SSH Server Fingerprints]].
Line 8: Line 7:
Normal non-encrypted FTP is not supported, instead SFTP from the OpenSSH package is used to transfer files to and from the shell server. Normal non-encrypted FTP is not supported, instead [[SFTP]] from the OpenSSH package is used to transfer files to and from the shell server.
Line 10: Line 9:
Sensitive webpages such as phpMyAdmin and Webmail is only available over HTTPS. The certificate is a class 3 certificate from CAcert. If you do not have CAcert's root certificate installed in your browser, follow these instructions to get it: http://wiki.cacert.org/wiki/BrowserClients Sensitive webpages such as phpMyAdmin and Webmail are only available over HTTPS, and the wiki and blog are optionally available over HTTPS. The certificate is signed by CAcert, which is not included by default in most browsers. Instead you have to install the CAcert root certificate  in your browser: http://wiki.cacert.org/wiki/BrowserClients
Line 13: Line 12:
Do not use the same password for your shell account as you use for other services. Especially not services that communicate over non-secure protocols like IRC or webpages. Do not use the same password for your shell account as you use for other services, especially those that communicate over non-secure protocols like IRC or webpages.
Line 17: Line 16:
== Phising and trust == == Phishing and trust ==
Line 22: Line 21:
Email can be sent from addresses other than one's own, so don't trust emails asking you to reply with your password or similar just because the sender address is from a trusted domain. Emails can be sent from addresses other than one's own, so don't trust emails asking you to reply with your password or similar just because the sender address is from a trusted domain.
Line 24: Line 23:
Use common sense and a certain ammount of paranoia and you will be allright :-)

If you want me to send emails to you encrypted or signed with PGP, that's no problem, just ask.

You can download my OpenPGP public key signature on my personal page: JohanMarcusson. You can not ''fully'' trust this however, since you downloaded it over the internet. But I'll make sure that no one else publishes an OpenPGP signature on this website trying to say it's mine.
Use common sense and a certain ammount of paranoia and you will be all right :-)
Line 33: Line 28:

Security

Here you can find some general information and pointers about security in general and more specifically Blinkenshell.

Encryption

The shell server only accepts encrypted logins via SSH (only protocol version 2 is allowed). Make sure to chech the key fingerprint the first time you log in via SSH: SSH Server Fingerprints.

Normal non-encrypted FTP is not supported, instead SFTP from the OpenSSH package is used to transfer files to and from the shell server.

Sensitive webpages such as phpMyAdmin and Webmail are only available over HTTPS, and the wiki and blog are optionally available over HTTPS. The certificate is signed by CAcert, which is not included by default in most browsers. Instead you have to install the CAcert root certificate in your browser: http://wiki.cacert.org/wiki/BrowserClients

Passwords

Do not use the same password for your shell account as you use for other services, especially those that communicate over non-secure protocols like IRC or webpages.

Also, check out our password policy: PasswordPolicy

Phishing and trust

No one at Blinkenshell will ever ask you for your password. Do not ever give away your password, not even to someone saying he/she is an admin.

On IRC, there often is no really good way to protect your nickname, so anyone can use anyone else's nickname. Don't trust someone to be an admin just because of the username. Check things like connecting host and if the user is identified with NickServ.

Emails can be sent from addresses other than one's own, so don't trust emails asking you to reply with your password or similar just because the sender address is from a trusted domain.

Use common sense and a certain ammount of paranoia and you will be all right :-)

Read more


CategoryInfo