For my link archive: [Wayback/Archive] How to set up OpenVPN with Google Authenticator on pfSense – Vorkbaard uit de toekomst
Should work with Authy too.
Via: [Archive] Matthijs ter Woord (@mterwoord) | Twitter
–jeroen
Posted by jpluimers on 2023/09/18
For my link archive: [Wayback/Archive] How to set up OpenVPN with Google Authenticator on pfSense – Vorkbaard uit de toekomst
Should work with Authy too.
Via: [Archive] Matthijs ter Woord (@mterwoord) | Twitter
–jeroen
Posted in 2FA/MFA, Authentication, Authy, Power User, Security | Leave a Comment »
Posted by jpluimers on 2023/09/14
For my link archive so I can better automate archiving Tweet threads using bookmarklets written in JavaScript:
The base will likely be this:
javascript:void(open(`https://archive.is/?run=1&url=${encodeURIComponent(document.location)}`))
which for now I have modified into this:
javascript:void(open(`https://threadreaderapp.com/search?q=${document.location}`))
It works perfectly fine without URL encoding and demonstrates the JavaScript backtick feature for template literals for which you can find documentation at [WayBack/Archive] Template literals – JavaScript | MDN.
Posted in *nix, *nix-tools, bash, bash, Bookmarklet, Communications Development, cURL, Development, HTTP, https, Internet protocol suite, Power User, Scripting, Security, Software Development, TCP, Web Browsers | Leave a Comment »
Posted by jpluimers on 2023/09/11
Translation of solving a broken xs4all connection:
Solved. Summary:
- Liander and UPS functiond, so both Fritz!Box and NTU had power
- NTU LEDs show Power and Glass, but no Ethernet
- Fritz!Box has green Power and WLAN LEDs and a red Info LED
Solution was cold reboot of NTU.
I also neatly tucked away the NTU power cord for an additional 8 minutes extra down time: [Wayback/Archive] mwgp ping – wiert.me
Posted in Fritz!, Fritz!Box, Hardware, Network-and-equipment, Power User, Security | Leave a Comment »
Posted by jpluimers on 2023/08/29
If you haven’t done so already, then enable 2FA for your GitHub account now: This will be a requirement in 2 weeks time.
The 2FA/MFA possibility started about half a year ago with [Wayback/Archive] Raising the bar for software security: GitHub 2FA begins March 13 – The GitHub Blog
You can have various means of 2FA, which al start with a choice between:
After completing either of those those, you can view/download a set of backup codes, and you can add more factors to your Multi-factor authentication setup up to these:
Posted in 2FA/MFA, Authentication, Development, DVCS - Distributed Version Control, git, GitHub, Power User, Security, Software Development, Source Code Management | Leave a Comment »
Posted by jpluimers on 2023/07/26
TL;DR is at the bottom (;
5 days ago this exploit development got published: [Wayback/Archive] snowcra5h/CVE-2023-38408: CVE-2023-38408 Remote Code Execution in OpenSSH’s forwarded ssh-agent.
It is about [Wayback/Archive] NVD – CVE-2023-38408 which there at NIST isn’t rated (yet?), neither at [Wayback/Archive] CVE-2023-38408 : The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remot.
However at [Wayback/Archive] CVE-2023-38408- Red Hat Customer Portal it scores 7.3 and [Wayback/Archive] CVE-2023-38408 | SUSE it did get a rating of 7.5, so since I mainly use OpenSuSE I wondered what to do as the CVE is formulated densely at [Wayback/Archive] www.qualys.com/2023/07/19/cve-2023-38408/rce-openssh-forwarded-ssh-agent.txt: it mentions Alice, but no Bob or Mallory (see Alice and Bob – Wikipedia).
Luckily, others readly already did the fine reading and emphasised the important bits, especially at [Wayback/Archive] RCE Vulnerability in OpenSSH’s SSH-Agent Forwarding: CVE-2023-38408 (note that instead of Alex, they actually mean Alice)
“A system administrator (Alice) runs SSH-agent on her local workstation, connects to a remote server with ssh, and enables SSH-agent forwarding with the -A or ForwardAgent option, thus making her SSH-agent (which is running on her local workstation) reachable from the remote server.”
According to researchers from Qualys, a remote attacker who has control of the host, which Alex has connected to, can load (dlopen()) and immediately unload (dlclose()) any shared library in /usr/lib* on Alice’s workstation (via her forwarded SSH-agent if it is compiled with ENABLE_PKCS11, which is the default).
The vulnerability lies in how SSH-agent handles forwarded shared libraries. When SSH-agent is compiled with ENABLE_PKCS11 (the default configuration), it forwards shared libraries from the user’s local workstation to the remote server. These libraries are loaded (dlopen()) and immediately unloaded (dlclose()) on the user’s workstation. The problem arises because certain shared libraries have side effects when loaded and unloaded, which can be exploited by an attacker who gains access to the remote server where SSH-agent is forwarded to.
Mitigations for the SSH-Agent Forwarding RCE Vulnerability
Posted in *nix, *nix-tools, bash, bash, Communications Development, Development, Internet protocol suite, OpenSSH, Power User, PowerShell, Scripting, Security, Software Development, SSH | Leave a Comment »
Posted by jpluimers on 2023/07/13
Since the SVB PGB site keeps violating the [Wayback/Archive] AP12: Eenmalige uitvraag – NORA Online principle, some more emphasis on it as the usefulness of the “ask information only once” principle is not limited to government sites or commercial sites providing services for the government.
The principle “ask information only once” is valid for any site and needs to be present at all times, especially in these situations:
I wrote about 1. in SVB PGB and DigiD security suddenly logged you out every 15 minutes despite the count down counter indicating otherwise ( wrote it in March 2021, published it in December 2021 when I thought it had been sort of solved).
That was obnoxious and took a very long time to fix (despite the mandatory aspect of the “ask information only once” principle and me pushing for a quick resolving in [Archive.is] Jeroen Wiert Pluimers on Twitter: “Omdat de @SVB_PGB site hiermee een noodzakelijk NORA archictectuur principe schendt (je raakt bij de logoff/logon de informatie die je op de pagina aan het invullen bent kwijt): kan dit een hoge prirotieit krijgen? Zie: – …”).
In February 2022, I had enough energy to submit the final PGB administration parts to the SVB PGB site. I didn’t get logged out every few minutes for the first hour or so (that only happened after being authenticated more than one hour, then repeating every 15 minutes), but I bumped into 2: loosing a lot of data in an at first unpredictable manner.
An underlying thing is that despite the NORA rules to be mandatory there is no sanction for the SVB (or any other government organisation) to fix this: users have to use the site and take the burden in order to get their payments. Ruurd Pels highlighted in these two answers to my tweets: harsh, but hitting the nail on the head:
The problem is that every each period of 15 minutes session activity , when you submit a form (the whole flow is form based, where the amount of data per form varies: sometimes just a confirmation button, sometimes a full month of data containing the hours worked) you get an intermediate quickly flashing “Redirecting…” on your screen, then loose the data entered in that form:
After more than an hour, I bumped into 1 again:
[Archive] Stephan Eggermont (@StOnSoftware) / Twitter quote retweeted my initial message at [Archive] Stephan Eggermont on Twitter: “🧵 NORA heeft een aantal hele duidelijke principes om de burger niet te frustreren. Niet twee keer naar hetzelfde vragen geldt ook als je een sessie time-out. Dan moet je dus al ingevulde gegevens bewaren” / Twitter, which translated is
🧵 NORA has a number of very clear principles in order not to frustrate citizens. Not asking for the same thing twice also applies if you time out a session. Then you have to save already entered data
An introduction about NORA is at Nederlandse Overheid Referentie Architectuur – Wikipedia:
Nederlandse Overheid Referentie Architectuur of NORA is het interoperabiliteitsraamwerk voor de Nederlandse overheid en vertaalt daartoe wetgeving, beleid en standaarden naar architectuurprincipes, beschrijvingen en modellen. Het is een beschrijving van uitgangspunten voor het inrichten van de informatiehuishouding van de Nederlandse overheid. NORA is relevant voor de uitvoering van alle publieke taken door publieke en private organisaties.
[Wayback/Archive] NORA: Nederlandse Overheid Referentie Architectuur – Bluefrog has a way easier “table of contents” to the principles than the NORA online site (note that some document numbers are intentionally not used):
DE TIEN BASISPRINCIPES VAN NORA
- [Wayback/Archive] BP01: Afnemers krijgen de dienstverlening waar ze behoefte aan hebben.
- [Wayback/Archive] BP02: Afnemers kunnen de dienst eenvoudig vinden.
- [Wayback/Archive] BP03: Afnemers hebben eenvoudig toegang tot de dienst.
- [Wayback/Archive] BP04: Afnemers ervaren uniformiteit in de dienstverlening door het gebruik van standaardoplossingen.
- [Wayback/Archive] BP05: Afnemers krijgen gerelateerde diensten gebundeld aangeboden.
- [Wayback/Archive] BP06: Afnemers hebben inzage in voor hen relevante informatie.
- [Wayback/Archive] BP07: Afnemers worden niet geconfronteerd met overbodige vragen.
- [Wayback/Archive] BP08: Afnemers kunnen erop vertrouwen dat informatie niet wordt misbruikt.
- [Wayback/Archive] BP09: Afnemers kunnen erop vertrouwen dat de dienstverlenerzich aan afspraken houdt.
- [Wayback/Archive] BP10: Afnemers kunnen input leveren over de dienstverlening.
DE 38 AFGELEIDE PRINCIPES
- [Wayback/Archive] AP01: Diensten zijn herbruikbaar
- [Wayback/Archive] AP02: Ontkoppelen met diensten
- [Wayback/Archive] AP03: Diensten vullen elkaar aan
- [Wayback/Archive] AP04: Positioneer de dienst
- [Wayback/Archive] AP05: Nauwkeurige dienstbeschrijving
- [Wayback/Archive] AP06: Gebruik standaard oplossingen
- [Wayback/Archive] AP07: Gebruik de landelijke bouwstenen
- [Wayback/Archive] AP08: Gebruik open standaarden
- [Wayback/Archive] AP09: Voorkeurskanaal internet
- [Wayback/Archive] AP10: Aanvullend kanaal
- [Wayback/Archive] AP11: Gelijkwaardig resultaat ongeacht kanaal
- [Wayback/Archive] AP12: Eenmalige uitvraag
- [Wayback/Archive] AP13: Bronregistraties zijn leidend
- [Wayback/Archive] AP14: Terugmelden aan bronhouder
- [Wayback/Archive] AP15: Doelbinding (AP)
- (AP16 is intentionally missing: merged into AP17)
- [Wayback/Archive] AP17: Informatie-objecten systematisch beschreven
- [Wayback/Archive] AP18: Ruimtelijke informatie via locatie
- [Wayback/Archive] AP19: Perspectief gebruiker
- [Wayback/Archive] AP20: Persoonlijke benadering
- [Wayback/Archive] AP21: Bundeling van diensten
- [Wayback/Archive] AP22: No wrong door
- [Wayback/Archive] AP23: Automatische dienstverlening
- [Wayback/Archive] AP24: Proactief aanbieden
- [Wayback/Archive] AP25: Transparante dienstverlening
- [Wayback/Archive] AP26: Afnemer heeft inzage
- [Wayback/Archive] AP27: Een verantwoordelijke organisatie
- [Wayback/Archive] AP28: Afspraken vastgelegd
- [Wayback/Archive] AP29: De dienstverlener voldoet aan de norm
- [Wayback/Archive] AP30: Verantwoording dienstlevering mogelijk
- [Wayback/Archive] AP31: PDCA-cyclus in besturing kwaliteit
- [Wayback/Archive] AP32: Sturing kwaliteit op het hoogste niveau
- [Wayback/Archive] AP33: Baseline kwaliteit diensten
- [Wayback/Archive] AP34: Verantwoording besturing kwaliteit
- (AP35 is intentionally missing: superseded by AP41)
- (AP36 is intentionally missing: superseded by AP41)
- (AP37 is intentionally missing: superseded by AP43)
- (AP38 is intentionally missing: superseded by AP43 and AP42)
- (AP39 is intentionally missing: superseded by AP42)
- [Wayback/Archive] AP40: Onweerlegbaarheid (principe)
- [Wayback/Archive] AP41: Beschikbaarheid
- [Wayback/Archive] AP42: Integriteit
- [Wayback/Archive] AP43: Vertrouwelijkheid (principe)
- [Wayback/Archive] AP44: Controleerbaarheid
The missing numbers (see also [Wayback/Archive] Betrouwbaarheid – NORA Online, [Wayback/Archive] Vervangen of Vervallen elementen in NORA – NORA Online and [Wayback/Archive] Vervangen of Vervallen uitspraken in NORA – NORA Online):
For a management overview, see [Wayback/Archive] NORA (Nederlandse Overheid Referentie Architectuur) – Digitale Overheid.
–jeroen
Posted in Authentication, Development, DigiD, Power User, Security, Software Development, Web Development | Leave a Comment »
Posted by jpluimers on 2023/06/19
I archived a long thread that started with [Archive] 𝚓𝚘𝚗𝚗𝚢﹏𝚜𝚊𝚞𝚗𝚍𝚎𝚛𝚜 on Twitter: “More fun publisher surveillance: Elsevier embeds a hash in the PDF metadata that is unique for each time a PDF is downloaded, this is a diff between metadata from two of the same paper. Combined with access timestamps, they can uniquely identify the source of any shared PDFs. ” / Twitter at [Wayback/Archive] Thread by @json_dirs on Thread Reader App – Thread Reader App.
TL;DR: publishers put hashes in PDF metadata to track back redistribution; they hardly use smarter watermarking as those are difficult to automatically parse; the hashes can be easily removed.
Posted in Hashing, LifeHacker, PDF, Power User, Security | Leave a Comment »
Posted by jpluimers on 2023/06/08
Many organisations train their personell with phishing attempts from domains that are different from the one the organisation uses.
The mantra is: only respond to emails (or clicking links in them) from domains you know.
Microsoft sent (still sends?) account expiration emails for various *.microsoft.com, *.visualstudio.com and other Microsoft domains like this:
[Wayback/Archive] 232840055-2ccfdb9b-2a13-4a34-92f5-f27f337825f8.png (766×653) email from
Microsoft account team <account-security-noreply@mail.msa.msidentity.com>
Posted in Pen Testing, Phishing, Power User, Red team, Security | Leave a Comment »