Passwords Passwords are unpleasant Hard to remember Remember a couple

Slides:



Advertisements
Similar presentations
Chapter 20 Oracle Secure Backup.
Advertisements

SSH Operation and Techniques - © William Stearns 1 SSH Operation and Techniques The Swiss Army Knife of encryption tools…
AfChix 2011 Blantyre, Malawi Log management. Log management and monitoring ■ What is log management and monitoring ? ● It's about keeping your logs in.
System Administration: Linux Track 2 Workshop June 2010 Pago Pago, American Samoa.
Password Management Programs By SIR Phil Goff, Branch 116 Area 2 Computers and Technology April 18,
Introduction to Git and Github Joshua imtraum.com.
Chapter 5 Roles and features. objectives Performing management tasks using the Server Manager console Understanding the Windows Server 2008 roles Understanding.
Erlware For Managing Distribution and Build Erlang User Conference 2007.
علیرضا فراهانی استاد درس: جعفری نژاد مهر Version Control ▪Version control is a system that records changes to a file or set of files over time so.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
Password Management Programs By SIR Phil Goff, Branch 116 Area 2 Computers and Technology January 17,
© Copyright 2009 Sysgem AG, 8002 Zurich, Switzerland Sysgem Products Sysgem Enterprise Manager (SEM)  Identity & Access Management  System Management.
Saeed Darvish Pazoki – MCSE, CCNA Abstracted From: Cisco Press – ICND 1 – Chapter 9 Ethernet Switch Configuration 1.
Configuration Management with Cobbler and Puppet Kashif Mohammad University of Oxford.
By: Anuj Sharma. Topics covered:  GIT Introduction  GIT Benefits over different tools  GIT workflow  GIT server creation  How to use GIT for first.
EXPOSING OVS STATISTICS FOR Q UANTUM USERS Tomer Shani Advanced Topics in Storage Systems Spring 2013.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
Quick Reference Guide The Multi-Vendor Backup Manager allows you to manage backup software settings on multiple agents in one place for Acronis, AppAssure,
INTRODUCTION TO GIT. Install Egit for eclipse Open eclipse->Help->Install New Software Search for one of the following -
Cloud Installation & Configuration Management. Outline  Definitions  Tools, “Comparison”  References.
Geant4 GRID production Sangwan Kim, Vu Trong Hieu, AD At KISTI.
1 Example security systems n Kerberos n Secure shell.
Introduction to Ansible
WHAT ARE BACKUPS? Backups are the last line of defense against hardware failure, floods or fires the damage caused by a security breach or just accidental.
1 Free Electrons. Kernel, drivers and embedded Linux development, consulting, training and support. http//free-electrons.com SSH Thomas Petazzoni Free.
Metrics data published Via different methods Monitoring Server
Secure services Unit-IV CHAP-1
SmartCenter for Pointsec - MI
Installation The Intercompany Integration Solution for SAP Business One Version 2.0 for SAP Business One 9.1 Welcome to the course on the installation.
© 2002, Cisco Systems, Inc. All rights reserved.
L – Modeling and Simulating Social Systems with MATLAB
Training Objectives About D2F Download Installation Configuration
PGP Key Management Basic Principals
Jason Bury Dylan Drake Rush Corey Watt
High Availability Linux (HA Linux)
NTP, Syslog & Secure Shell
Git-Github Safa Prepared for the course COP4331 – Fall 2016.
CS/COE 1520 Recitation Week 2
Setting up Git, GitBash, and GitHub
Setting up Git, GitBash, and GitHub
APRICOT 2008 Network Management Taipei, Taiwan February 20-24, 2008
L – Modeling and Simulating Social Systems with MATLAB
Introduction
Software Engineering Architectural Design Chapter 6 Dr.Doaa Sami
How We Think Of Computers
Campus Monitoring Service
Log management AfNOG 2008 Rabat, Morocco.
PGP Key Management Basic Principals
Installation The Intercompany Integration Solution for SAP Business One Version 2.0 for SAP Business One 9.1 Welcome to the course on the installation.
(Advanced) Web Application Development
Intro to Config Management Using Salt Open Source
Telnet/SSH Connecting to Hosts Internet Technology.
Git-Github Tools Prepared for COP4331. Git-Github Tools Prepared for COP4331.
Scaling Experiments.
SSH SSH is “Secure SHell” Secure, compressed, widely supported, fast
Introduction to Ansible
© copyright Janson Industries 2011
System & Network Administration (MCSA & RHCSA)
Git CS Fall 2018.
Platform Architecture
PGP Key Management Basic Principles
Version Control with Git
Hardware-less Testing for RAS Software
Lecture9: Embedded Network Operating System: cisco IOS
Version Control with Git and GitHub
Chapter 7 Network Applications
Features Overview.
Introduction to The Git Version Control System
Computational Environment Management
Lecture9: Embedded Network Operating System: cisco IOS
Presentation transcript:

Passwords Passwords are unpleasant Hard to remember Remember a couple Single points of failure Algorithmic passwords are also flawed Use 'pwgen' to make decent passwords Still hard to remember

Storing passwords in a vault Why not put your passwords in a file Password protect the file Single point of failure has shifted to a private file Still not ideal, but certainly safer than 1 password to each thing Plenty of password managers out there: 1Password, KeePass, LastPass, pass

pass password manager Uses GPG keypair for encryption/decryption of passwords Stores each password in a separate file All files kept in a GIT repo Allows push/pulling to/from machines you control Do not put them on GitHub/BitBucket/etc. Lots of platforms supported

Making GPG keys – Quick redux Check LPI-102 Topic 110 gpg --gen-key [Generate a key interactively] gpg --output revoke.asc --gen-revoke mykey [Generate revocation cert. Critical for identity keys!] gpg --export-secret-key -a “MyUser” -o priv.key Export secret key, needed on every device to decrypt passwords gpg --export-public-key -a “MyUser” -o pub.key Export public key, needed on every device to encrypt passwords

Setting up pass pass init foo@bar.com Uses GPG key for foo@bar.com pass git init pass git remote add origin myVPS.com:somefolder pass git push -u all pass generate Logins/Netsoc 32 Makes a 32-char long password in the file Logins/Netsoc pass git push

Cool things Each folder (e.g. Logins/Netsoc) can have its own GPG key to en/decrypt $folder/.gpg-id contains the GPG secret key ID The path is, by default, ~/.password-store Use gpg-agent to stop having to enter password repeatedly eval “$(gpg-agent –daemon)” Has clipboard feature; stores password for 45 seconds pass -c Logins/Netsoc

Managing lots of machines Very relevant to the ~~~cloud~~~ Two types of methods: Configuration management Remote shells Lots of different configuration management software: Salt, Ansible, Puppet, Chef, CFEngine, Bcfg2, Spacewalk, etc. Many different approaches too: Enforcing/Passive Agent/Agentless Symmetric/Asymmetric communication layer Config storage: JSON/XML/LDAP/????

Remote shells Quick way to execute commands on many servers Fast hack: tmux with 'setw synchronize-panes' Better way: pdsh fab Also a deployment system

Monitoring machines Lots of machines => lots of possible failures Need monitoring and alerting systems Very detailed monitoring can be done with collectd Can output to syslog, files, CSV, etc. Syslog can be directed to a syslog server (or something like logstash) Round-robin remote monitoring done with cacti/munin Munin is very simple, uses telnet(!) to gather data

Monitoring machines A few options Nagios Zabbix Icinga (holy war with nagios) Nagios uses emails/pagers to alert people to problems Problems are when some script nagios fires fails Three states: Normal (or recovered) Warning Critical

Nagios Two ways of monitoring: Get central node to check remote with commands over SSH Generally called “Push monitoring” Ask remote nodes for information using NRPE Generally called “Pull monitoring” NRPE – Nagios Remote Plugin Execution Scripts for testing system exist on client, and are fired when client receives instruction from master Can get mixture of both (if you want to make people sad)

Asset management Managing equipment is messy Lots of bureaucracy Use ralph (http://allegro.tech/ralph/) Geared towards physical datacentres Less appropriate for cloud stuff

Backups Critical Drives die, and you can be stuck without anything Lots of software for backups Acronis, Bacula, Amanda, rsync(!) Netsoc uses bacula 4 components: Director: Tells things to backup Storage-daemon: Place where backups are put File-daemon: Places where backups come from Console: Lets you check things