<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Security on Michele Bologna</title>
    <link>https://www.michelebologna.net/categories/security/</link>
    <description>Recent content in Security on Michele Bologna</description>
    <generator>Hugo</generator>
    <language>en</language>
    <lastBuildDate>Wed, 13 Feb 2019 00:00:00 +0000</lastBuildDate>
    <atom:link href="https://www.michelebologna.net/categories/security/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>La mia esperienza con SPID e Poste Italiane</title>
      <link>https://www.michelebologna.net/2019/la-mia-esperienza-con-spid-e-poste-italiane/</link>
      <pubDate>Wed, 13 Feb 2019 00:00:00 +0000</pubDate>
      <guid>https://www.michelebologna.net/2019/la-mia-esperienza-con-spid-e-poste-italiane/</guid>
      <description>&lt;p&gt;Questa settimana ho deciso di attivare lo SPID (Sistema Pubblico di Identità Digitale).&lt;/p&gt;&#xA;&lt;h2 id=&#34;cosa-è-lo-spid&#34;&gt;&#xA;  Cosa è lo SPID&#xA;  &lt;a class=&#34;heading-link&#34; href=&#34;#cosa-%c3%a8-lo-spid&#34;&gt;&#xA;    &lt;i class=&#34;fa-solid fa-link&#34; aria-hidden=&#34;true&#34; title=&#34;Link to heading&#34;&gt;&lt;/i&gt;&#xA;    &lt;span class=&#34;sr-only&#34;&gt;Link to heading&lt;/span&gt;&#xA;  &lt;/a&gt;&#xA;&lt;/h2&gt;&#xA;&lt;p&gt;L&amp;rsquo;identità digitale SPID è rappresentata da un username e una password che vi permettono di autenticarvi sui siti della Pubblica Amministrazione (PA). I suoi usi sono molteplici e sta prendendo sempre più piede per le comunicazioni online tra cittadino e PA.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Secure your SSH server against brute-force attacks with Fail2ban</title>
      <link>https://www.michelebologna.net/2017/secure-your-ssh-server-against-brute-force-attacks-with-fail2ban/</link>
      <pubDate>Mon, 05 Jun 2017 00:00:00 +0000</pubDate>
      <guid>https://www.michelebologna.net/2017/secure-your-ssh-server-against-brute-force-attacks-with-fail2ban/</guid>
      <description>&lt;h1 id=&#34;the-problem-ssh-can-be-brute-forced&#34;&gt;&#xA;  The problem: SSH can be brute-forced&#xA;  &lt;a class=&#34;heading-link&#34; href=&#34;#the-problem-ssh-can-be-brute-forced&#34;&gt;&#xA;    &lt;i class=&#34;fa-solid fa-link&#34; aria-hidden=&#34;true&#34; title=&#34;Link to heading&#34;&gt;&lt;/i&gt;&#xA;    &lt;span class=&#34;sr-only&#34;&gt;Link to heading&lt;/span&gt;&#xA;  &lt;/a&gt;&#xA;&lt;/h1&gt;&#xA;&lt;p&gt;I usually leave an SSH server on a dedicated port on every server I administer and, as you may recall, &lt;a href=&#34;https://www.michelebologna.net/2015/hardening-services-lets-review-our-config-files/&#34;  class=&#34;external-link&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;I even linked two well-written guides to properly configure and harden SSH services&lt;/a&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Unusual way of backup sensitive data</title>
      <link>https://www.michelebologna.net/2016/unusual-way-of-backup-sensitive-data/</link>
      <pubDate>Tue, 11 Oct 2016 00:00:00 +0000</pubDate>
      <guid>https://www.michelebologna.net/2016/unusual-way-of-backup-sensitive-data/</guid>
      <description>&lt;p&gt;Over the weekend I was in a &lt;em&gt;backup mood&lt;/em&gt;, so I decided to start backup everything on my local computers. First of all, I started with sensitive data (which I call &lt;em&gt;vault&lt;/em&gt;), namely:&lt;/p&gt;</description>
    </item>
    <item>
      <title>OpenVPN with multiple configurations (TCP/UDP) on the same host (with systemd)</title>
      <link>https://www.michelebologna.net/2016/openvpn-with-multiple-configurations-on-the-same-host-with-systemd/</link>
      <pubDate>Sat, 09 Jul 2016 00:00:00 +0000</pubDate>
      <guid>https://www.michelebologna.net/2016/openvpn-with-multiple-configurations-on-the-same-host-with-systemd/</guid>
      <description>&lt;p&gt;As much more people are getting worried about their &lt;strong&gt;online privacy&lt;/strong&gt; (including me), &lt;a href=&#34;https://www.michelebologna.net/2015/12/workaround-for-openvpn-pam-authentication-broken-on-ubuntu-15-10/&#34;  class=&#34;external-link&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;I started to use a server as a VPN termination (with OpenVPN)&lt;/a&gt; when I need to access the Internet via non-secure wired or wireless networks (e.g., hotel wireless network, airport Wi-Fi, etc.).&lt;/p&gt;</description>
    </item>
    <item>
      <title>Fun with Python powered telnetd honeypot</title>
      <link>https://www.michelebologna.net/2015/fun-with-python-powered-telnetd-honeypot/</link>
      <pubDate>Fri, 04 Sep 2015 00:00:00 +0000</pubDate>
      <guid>https://www.michelebologna.net/2015/fun-with-python-powered-telnetd-honeypot/</guid>
      <description>&lt;h2 id=&#34;reason-hardening-serendipity-and-curiosity&#34;&gt;&#xA;  Reason: hardening, serendipity and curiosity&#xA;  &lt;a class=&#34;heading-link&#34; href=&#34;#reason-hardening-serendipity-and-curiosity&#34;&gt;&#xA;    &lt;i class=&#34;fa-solid fa-link&#34; aria-hidden=&#34;true&#34; title=&#34;Link to heading&#34;&gt;&lt;/i&gt;&#xA;    &lt;span class=&#34;sr-only&#34;&gt;Link to heading&lt;/span&gt;&#xA;  &lt;/a&gt;&#xA;&lt;/h2&gt;&#xA;&lt;p&gt;As you already know, in the past weeks I hardened all of my boxes: while doing it, I flushed all iptables/ipfw rules, changed the default policy to DROP and take it from there to enable every rule as soon as I need it. Whilst Ubuntu uses &lt;a href=&#34;https://help.ubuntu.com/community/UFW&#34;  class=&#34;external-link&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;ufw&lt;/a&gt; as a fronted for iptables, Fedora uses &lt;a href=&#34;https://fedoraproject.org/wiki/FirewallD&#34;  class=&#34;external-link&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;firewalld&lt;/a&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Hardening services: let&#39;s review our config files</title>
      <link>https://www.michelebologna.net/2015/hardening-services-lets-review-our-config-files/</link>
      <pubDate>Sun, 28 Jun 2015 00:00:00 +0000</pubDate>
      <guid>https://www.michelebologna.net/2015/hardening-services-lets-review-our-config-files/</guid>
      <description>&lt;p&gt;It&amp;rsquo;s &lt;strong&gt;hardening&lt;/strong&gt; Sunday here: I reviewed the config files of my main daemons (&lt;em&gt;nginx, openvpn, tinc, sshd&lt;/em&gt;) with the help of two resources that I want to share with you, fellow readers.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Ruby e OSX: problemi coi certificati SSL durante l&#39;installazione delle gem</title>
      <link>https://www.michelebologna.net/2013/ruby-e-osx-problemi-coi-certificati-ssl-durante-linstallazione-delle-gem/</link>
      <pubDate>Mon, 04 Nov 2013 00:00:00 +0000</pubDate>
      <guid>https://www.michelebologna.net/2013/ruby-e-osx-problemi-coi-certificati-ssl-durante-linstallazione-delle-gem/</guid>
      <description>&lt;p&gt;Nella nuova versione dell&amp;rsquo;installer di &lt;a href=&#34;https://rubygems.org/&#34;  class=&#34;external-link&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;RubyGems&lt;/a&gt; è presente un check di sicurezza sul certificato SSL del sito da cui si scaricano le gem che si stanno per installare. Questo può comportare un errore durante l’installazione di una qualsiasi gem:&lt;/p&gt;</description>
    </item>
    <item>
      <title>HTTPS e le applicazioni di terze parti: attenzione!</title>
      <link>https://www.michelebologna.net/2012/https-e-le-applicazioni-di-terze-parti-attenzione/</link>
      <pubDate>Sat, 01 Dec 2012 00:00:00 +0000</pubDate>
      <guid>https://www.michelebologna.net/2012/https-e-le-applicazioni-di-terze-parti-attenzione/</guid>
      <description>&lt;blockquote&gt;&#xA;&lt;p&gt;&amp;ldquo;È sufficiente usare HTTPS per essere sicuri: protegge la comunicazione cifrando il traffico e usando certificati validati da CA riconosciute&amp;rdquo;.&lt;/p&gt;&#xA;&lt;/blockquote&gt;&#xA;&lt;p&gt;&lt;strong&gt;SBAGLIATO&lt;/strong&gt;. Spesso si sente pronunciare questa frase, ma non è del tutto vero: ho recentemente letto con molta attenzione un paper presentato alla conferenza &lt;a href=&#34;https://www.sigsac.org/ccs/CCS2012/&#34;  class=&#34;external-link&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;CCS 2012&lt;/a&gt;, una conferenza dedicata alla &lt;strong&gt;Computer Security&lt;/strong&gt;. Il paper ha un titolo curioso: &amp;ldquo;&lt;a href=&#34;https://www.cs.utexas.edu/~shmat/shmat_ccs12.pdf&#34;  class=&#34;external-link&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;&lt;em&gt;The Most Dangerous Code in the World: Validating SSL Certiﬁcates in Non-Browser Software&lt;/em&gt;&lt;/a&gt;&amp;rdquo;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Wordpress plugin: Chap Secure Login</title>
      <link>https://www.michelebologna.net/2012/wordpress-plugin-chap-secure-login/</link>
      <pubDate>Wed, 08 Aug 2012 00:00:00 +0000</pubDate>
      <guid>https://www.michelebologna.net/2012/wordpress-plugin-chap-secure-login/</guid>
      <description>&lt;p&gt;Ho recentemente installato &lt;a href=&#34;https://wordpress.org/extend/plugins/chap-secure-login/&#34;  class=&#34;external-link&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;&lt;strong&gt;Chap Secure Login&lt;/strong&gt;&lt;/a&gt;, un plugin molto utile per Wordpress che risolve un problema da non sottovalutare: l&amp;rsquo;autenticazione su un canale non cifrato quale HTTP (è buona norma usare HTTPS quando si effettua uno scambio di informazioni riservate, quali password, numeri di carta di credito, etc. per evitare che eventuali &lt;em&gt;eavesdropper&lt;/em&gt; possano carpire le informazioni scambiate ed utilizzarle a vostro svantaggio).&lt;/p&gt;</description>
    </item>
    <item>
      <title>Facebook e la navigazione HTTPS da abilitare</title>
      <link>https://www.michelebologna.net/2011/facebook-e-la-navigazione-https-da-abilitare/</link>
      <pubDate>Sun, 06 Mar 2011 00:00:00 +0000</pubDate>
      <guid>https://www.michelebologna.net/2011/facebook-e-la-navigazione-https-da-abilitare/</guid>
      <description>&lt;p&gt;&lt;a href=&#34;https://www.michelebologna.net/images/2011/03/facebook_https.png&#34; &gt;&lt;/a&gt;&lt;a href=&#34;https://www.michelebologna.net/images/2011/03/facebook_https.png&#34; &gt;&lt;/a&gt;Mi sono accorto che Facebook offre un&amp;rsquo;opzione molto utile e assolutamente da abilitare. Infatti, sotto &lt;em&gt;Account &amp;gt; Impostazioni Account &amp;gt; Protezione dell&amp;rsquo;Account&lt;/em&gt; troviamo un&amp;rsquo;opzione per abilitare la navigazione HTTPS quando possibile.&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
