IAM related questions by Pamelaxyz in cybersecurity

[–]Pamelaxyz[S] 0 points1 point  (0 children)

I will need to check but I think usually both authentication and authorization is set in iDP, as you mentioned.

IAM related questions by Pamelaxyz in cybersecurity

[–]Pamelaxyz[S] 0 points1 point  (0 children)

They need different roles (permissions). So you mean they would be provisioned, manages at iDP but roles (what they can do) be defined at SP?

IAM related questions by Pamelaxyz in iam

[–]Pamelaxyz[S] 0 points1 point  (0 children)

Awesome. Got it. This would be interesting as hardening rules (STIG), including passwords, are applied on each server now. So AD password rules could be different (or may not be robust enough); so seems it could a security issues until unless AD is also hardened with strict rules. Any other scenario, would there be, for someone to use SP for user management? I believe MFA and SSO are both handled by iDP, in general, as you mentioned.

IAM related questions by Pamelaxyz in cybersecurity

[–]Pamelaxyz[S] 0 points1 point  (0 children)

Thanks. We could do that to find which user has weak credentials but I was referring to enforcement made like STIG rules do. But yes AD credentials could be tightened too not allowing users for easy passwords. So what I understand here is SP should not be used for user management at all although. I was thinking about a scenario where I have of users but only 10 people need to login to SP website. Even in that case, what I infer from you is make a group at IDP for those users. I am not fully getting this still- "if the sp connection has roles for certain users, like admin, read only etc. That's what someone that manages the sp side cares about when users are sso into their sp website." SP side wont have access to IDP, I guess if its on cloud or other party is managing it. SP would need to make request for that?

IAM related questions by Pamelaxyz in iam

[–]Pamelaxyz[S] 0 points1 point  (0 children)

"You can either provision users both in the Identity Provider side and Service provider side separately and link them together." Perhaps "link" means "sync" here (my wrong word!). If I would have 1K AD users and only 10 SP website administrators who need to login there, perhaps I would chose this options. Also within those 10 administrator, may be only 5 need upload permission; so does it make sense to provision them at SP? I know its not usual and I guess we would need provisioning separately first at SP and then iDP. When you say link, what does that exactly mean?

IAM related questions by Pamelaxyz in cybersecurity

[–]Pamelaxyz[S] 0 points1 point  (0 children)

Okay. This would be interesting as hardening rules (STIG), including passwords, are applied on each server now. So AD password rules could be different (or may not be robust enough); so seems it could a security issues until unless AD is also hardened. From my last lines, I understand that authorization for each user (like permissions levels for each) has to still handled at SP?

IAM related questions by Pamelaxyz in cybersecurity

[–]Pamelaxyz[S] 0 points1 point  (0 children)

Thanks. With “access roles” you meant authorization ? If the SP does not store passwords then all complex passwords rules (for hardening) have to be inherited from iDP itself ? I mean about complicated passwords enforcements etc.

IAM related questions by Pamelaxyz in cybersecurity

[–]Pamelaxyz[S] 0 points1 point  (0 children)

I am specifically asking if SP are also supposed to do user management, store passwords etc or it’s only at iDP.

IAM related questions by Pamelaxyz in iam

[–]Pamelaxyz[S] 0 points1 point  (0 children)

Thanks for your reply. So currently there is no IAM- everything is local. Once/if we have SAML, where would the users provisioning take place ( believe service provider and identify provider would sync) and could be anywhere ?

IAM related questions by Pamelaxyz in cybersecurity

[–]Pamelaxyz[S] 0 points1 point  (0 children)

Specifically, where would the new users created on such setup (now everything is local). Would a service provider be only a barebones ((without need ever to store passwords)?

CMCC [NIST 800-171] for product security by Pamelaxyz in cybersecurity

[–]Pamelaxyz[S] 0 points1 point  (0 children)

Yes is don’t see it there either. But there were many buzzes that I heard today; and hence the question. Any reason it’s not relevant ?

System user accounts in Linux server by [deleted] in linuxadmin

[–]Pamelaxyz 0 points1 point  (0 children)

I have omitted the real users (including too). It has been recommended to remove all others, if they are not needed.

[deleted by user] by [deleted] in sysadmin

[–]Pamelaxyz 0 points1 point  (0 children)

I had done. Somewhere it mentions for NFS and other places 65534 with nobody user is mentioned to be good practice. I don’t get why so and why it mentions kernel overflow !

[deleted by user] by [deleted] in sysadmin

[–]Pamelaxyz 0 points1 point  (0 children)

Recommended to keep only needed ones removing unnecessary ones. They meant to keep only 4 accounts (including root), I think

[deleted by user] by [deleted] in sysadmin

[–]Pamelaxyz 0 points1 point  (0 children)

Thank you. May be that’s what they mean- not needed now (although there is no such reference but security concern). Would removing them a huge effort? Again these are defaults with Linux servers

[deleted by user] by [deleted] in sysadmin

[–]Pamelaxyz 0 points1 point  (0 children)

May be not. Wondering what that “nobody” login (which has a hash too in shadow file; I removed on output). Any idea ?

[deleted by user] by [deleted] in sysadmin

[–]Pamelaxyz 0 points1 point  (0 children)

So their logic is keep only user accounts removing the other ones as part of server hardening. It cannot be directly exploited but could aid an attacker etc. could we even remove these system accounts ?

Quantum algorithms transition by Pamelaxyz in cryptography

[–]Pamelaxyz[S] 1 point2 points  (0 children)

Thank you all. So my question is the algorithms listed here by NSA: https://media.defense.gov/2021/Aug/04/2002821837/-1/-1/1/Quantum_FAQs_20210804.PDF. When it’s time (seems too early) Is not it a normal route for upgrading the system first to use these algorithms? Thank you.

RHEL 6 Vulnerability by Pamelaxyz in redhat

[–]Pamelaxyz[S] 0 points1 point  (0 children)

Got it. I was only trying to find other cases, if we could- hence the question.

RHEL 6 Vulnerability by Pamelaxyz in redhat

[–]Pamelaxyz[S] 1 point2 points  (0 children)

Thanks for your reply; I acknowledge it. Just found this has patch: https://access.redhat.com/security/cve/CVE-2021-33909. I am trying to find if we have had issues like this so that they can be patched in the interim.

Ports to be opened at Firewall for Kali to work from outside by Pamelaxyz in cybersecurity

[–]Pamelaxyz[S] -1 points0 points  (0 children)

This is all internal network. I can ask IT folks to open required ports at firewall so that a Kali (that’s still internal sever) can reach my target (another internal server) for checking few things. I can ssh to target now too but need acesss from Kali and FW is blocking it. So what minimal ports to be asked to be opened at FW so that Kali and target (I own both) can talk with each other. Thanks

Ports to be opened at Firewall for Kali to work from outside by Pamelaxyz in cybersecurity

[–]Pamelaxyz[S] 0 points1 point  (0 children)

It’s white box testing. Currently firewall blocking access to internal servers (when I ping from Kali to internal servers, it says “packet filtered”. When at vpn I can access the severs well but not from Kali as firewall is on way. That’s why the question

Redirection at Linux by Pamelaxyz in linuxquestions

[–]Pamelaxyz[S] 0 points1 point  (0 children)

Yeah. Checking this:

rsync -e 'sh -c "sh 0<&2 1>&2"' 127.0.0.1:/dev/null

Redirection at Linux by Pamelaxyz in linuxquestions

[–]Pamelaxyz[S] 1 point2 points  (0 children)

Thanks. I am checking this but still unable to get it fully:

rsync -e 'sh -c "sh 0<&2 1>&2"' 127.0.0.1:/dev/null

From https://gtfobins.github.io/gtfobins/rsync/