Posted in Access restrictions DDoS Digital Certificate

SSH restrictions using public keys, commands and allowed hosts

Description You want to manage an ssh server that can be reached by specific IPs and only specified commands will be accessible to the ssh user. Explanation In our example we have 2 hosts located in the same network (to prove the concept) with followings IP’s: 192.168.122.1 (backend) and 192.168.122.157…

Continue Reading SSH restrictions using public keys, commands and allowed hosts
Posted in Access restrictions DDoS Second factor authentication

Google Authenticator as a second factor authentication

Google Authenticator as a second factor authentication Description In this post I would like to share another a solution (in my previous post I was talking about DUO – https://duo.com) that can be used as a secondĀ  factor authentication. In this moment on the market there are a few solutions…

Continue Reading Google Authenticator as a second factor authentication
Posted in Access restrictions Digital Certificate OpenSSL use cases

Protecting sensitive information using OpenSSL

Description You want to send some sensitive information to somebody who is not part of your network, so the information should no go unprotected through the environment. This post describes the case where you add sensitive data encrypted on a CD, DVD or even on a hard disk, send that…

Continue Reading Protecting sensitive information using OpenSSL
Posted in Access restrictions DDoS

Blocking unwanted IP addresses on F5

Blocking unwanted IP addresses on F5 Description A load balancer is a device that acts as a reverse proxy and distributes network or application traffic across a number of servers. Load balancers are used to increase reliability and capacity of the applications. It is very useful to have a solution…

Continue Reading Blocking unwanted IP addresses on F5
Posted in Access restrictions DDoS

Fail2Ban

Fail2Ban Description Fail2Ban is a very good tool if you want to protect yourself from intruders and you want to have a good inside of your architecture in terms of access. According with the official description (https://www.fail2ban.org/wiki/index.php/Main_Page) Fail2ban scans log files (e.g. /var/log/apache/error_log) and bans IPs that show the malicious…

Continue Reading Fail2Ban