security

  1. G

    SSH TFA blockt Console

    Hallo zusammen, ich habe folgendes Problem: Ich nutze eine TFA mit OTPs sowohl in der Webgui als auch für SSH. Mir ist dann aufgefallen, dass der Zugriff auf die VM Console nicht mehr funktioniert, wenn diese auf einem anderen Server liegt. Heißt ich bin auf Server 1 angemeldet und möchte auf...
  2. A

    containers displaying all storage on host

    I've been playing with containers on my lab cluster, and I noticed that containers can see ALL storage attached to the host by simply checking lsblk, either with priviledged or unpriviledged containers. Is this the correct behavior? if so, how can I go about masking the host's storage from the...
  3. Y

    Suricata Testing

    Hello, i'm testing Suricata as IDS (not IPS).... i have installed all the stuff and i have configured a single VPS debian LXC with LAMP. How can i test if suricata works ? I have tested a query string on the VPS like this...
  4. M

    Ways to pass a user Authentication token??

    .no.help.here. (EDIT)
  5. onlime

    CVE-2016-5195 Dirty COW

    Can you give us a time frame when kernel 4.4.19-1-pve (latest available AFAIK) is going to be patched for CVE-2016-5195 / Dirty COW ?
  6. M

    LXC privilege level?

    I'm up and running with PVE v4.1, and I rather like it so far. However, I ran into a little security snag with LXC today, and that made med start to dig a bit more into LXC security, but first the problem that triggered it all. The problem is that you can view the complete output of the host...
  7. Y

    Security Problem server Violated

    Hello, i have several server violated, root escaletion. Some details: ---------------------------------------------------------------- root@prx:/home/enrico# lsof -p 361304 COMMAND PID USER FD TYPE DEVICE SIZE/OFF NODE NAME 503 361304 root cwd DIR 0,25 4096...
  8. JonathanB19

    Warning about public portmapper on PVE host

    Sorry if this has been mentioned before but I can't initially find anything. Just got a warning from my ISP about this: The folks at shadowserver security group are reporting open portmapper hosts to us, these need to get fixed as they can be used in amplification denial of service attacks...