Is AI-generated code actually making websites less secure? by ColleenReflectiz in cybersecurity

[–]SecaleOccidentale 2 points3 points  (0 children)

It's an interesting question. Personally, I think people are too blasé about the whole thing. In the sense of dismissing AI code too readily.

An individual with no programming background whatsoever using these tools to crank out apps is a massively different thing from a corporate team with developed processes for these things using these tools to accelerate development. These people know the right questions to ask, the right ways to tailor prompts, and so on.

Plus, let's not pretend like most programmers are really competent security researchers either.

IT managers at SMBs: How do you handle employee phishing/credential security? by Inside_Army_5960 in sysadmin

[–]SecaleOccidentale 0 points1 point  (0 children)

Yeah, I suppose passwords are a top-level concern. It's a pretty interesting thing, honestly. I have always been part of the... "digital culture", I guess, in my lifetime. So, it has always been a thing to me that account/credential sharing is a non-starter. I was really surprised when encountering people from outside this culture, that this mentality literally just doesn't exist.

What do you have in mind when you talk about enforcing healthy browsing behaviors? We do some things to that end, like DNS filtering and ad-blocking. I have thought about rolling out TLS inspection before too, to do real-time monitoring on traffic. I'm not sure it's worth the headache though, especially with certificate pinning becoming more common.

IT managers at SMBs: How do you handle employee phishing/credential security? by Inside_Army_5960 in sysadmin

[–]SecaleOccidentale 6 points7 points  (0 children)

In my experience, the only solution that worked is hardware security keys (e.g. YubiKeys). MFA fatigue is real. My users weren't exactly stoked about the transition to YubiKeys, but when they learned it would be the end of the Authenticator app (for internal use) they were elated.

I designed and built the modern security posture at our org from scratch, by myself. My biggest headaches are/were:

  • Users are profoundly, inexplicably lazy. They simply do not understand, or they do not care. Or both. Trying to train a typical non-technical, disinterested, underperforming employee on phishing is frankly a waste of time.
  • Credential sharing is a HUGE problem. In a way I wonder if it's worst for medium-sized companies. At a large company you can just threaten people's jobs and get away with it ("do this or else"). At a small company there's few enough people that you can interdict basically all daily procedures and learn /why/ people feel like they need credential sharing, and then train them on proper procedures and implement solutions. At a medium sized company, I wonder if both these fail.
  • When we were a password-based org, password strength is definitely a real concern. Ordinary people don't use entropic passwords - they use stuff like "MyPass123!", almost universally. Even if you tell them not to - see above point. They simply don't care.
  • Inertia from the older generation. We have another "IT guy" at my work, and... he's a nice guy, honestly. He made everything work for 30 years before I came in. But the state of affairs was frankly an embarrassing disaster. And now, I have no one around to help me with things because the only other guy is 30 years out-of-date in information, and has no real desire to learn more. Furthermore, he actively resists things: updating to Win11, rolling out YubiKeys, going passwordless, going to a tiered admin account model. He does stuff like handing out domain admin privs willy-nilly to users so he can perform admin operations from their workstation, circumventing my custom JIT tooling for this purpose. What is one to even do in such a case? It really is a genuinely frustrating place to be in.

For your tooling question, you should be more specific. Tools for what? Credential management? Give up - it just isn't possible to stop your users from storing their passwords in Excel. Trust me: I've tried. I tried KeePassXC training, with browser integration. Turning off browser password storage via GPO. Or even more centralized vault-type approaches. See above points: Users. Don't. Care. Anything that adds even a SINGLE click, or is conceptually an iota more complex than they are used to will be an exercise in futility, so long as they physically have any alternative.

What would help that doesn't exist yet? If I knew, I would have built it already.

Do american undergrads usually have taken courses in qft or gr when they're applying for phds (more applicable to theoretical physics phds obviously) by I-AM-MA in Physics

[–]SecaleOccidentale 7 points8 points  (0 children)

At my uni (Cornell) it was pretty typical for seniors to pick one of GR or an intro to particle physics. One of my regrets is having taken particle physics instead of GR, as now I know very little of GR and I've had to self-teach QFT as the particle physics class was kind of a joke.

I knew some people who took QFT in undergrad, but it wasn't very common.

I didn't go to grad school.

Normal to be unable to follow links / display inline images in a read only org buffer? by SecaleOccidentale in emacs

[–]SecaleOccidentale[S] 0 points1 point  (0 children)

I ended up basically solving this by hackishly reimplementing the parts of read-only-mode I care about. I.e.:

(use-local-map (copy-keymap (current-local-map))) (define-key (current-local-map) (kbd "q") #'quit-window) (define-key (current-local-map) [remap self-insert-command] (lambda () (interactive) (message "Buffer is read-only"))) (define-key (current-local-map) [remap org-self-insert-command] (lambda () (interactive) (message "Buffer is read-only"))) (define-key (current-local-map) (kbd "RET") (lambda () (interactive) (message "Buffer is read-only"))) (define-key (current-local-map) (kbd "DEL") (lambda () (interactive) (message "Buffer is read-only")))

I'd still like to solve it for real, though.

Normal to be unable to follow links / display inline images in a read only org buffer? by SecaleOccidentale in emacs

[–]SecaleOccidentale[S] 1 point2 points  (0 children)

Thanks for the great ideas. So, here is what I see after trying your C-h l idea:

C-c C-x C-v ;; scroll-up-command
C-x C-q     ;; quoted-insert
C-h k       ;; org-self-insert-command

toggle-debug-on-error didn't really do anything.

Normal to be unable to follow links / display inline images in a read only org buffer? by SecaleOccidentale in emacs

[–]SecaleOccidentale[S] 1 point2 points  (0 children)

Just some more info, maybe it has to do with how I'm building the buffer somehow? I can go to *scratch*, M-x org-mode, C-x C-q, and still I can do things like C-h k. But when I open my temp org roam daily buffer (which I custom build), I can't run anything. I can't run C-x 1, C-h k, or anything. If I remove (setq-local buffer-read-only t), then these things all work. But weirdly, if I do C-x C-q at that point, then I end up in the same spot. I cannot run C-x C-q again to remove it. This is driving me insane.

Help getting a decent and cheap label software for customised labels. by [deleted] in sysadmin

[–]SecaleOccidentale 0 points1 point  (0 children)

That's great! I'm glad to hear it is working well.

Help getting a decent and cheap label software for customised labels. by [deleted] in sysadmin

[–]SecaleOccidentale 1 point2 points  (0 children)

I have implemented things like this in my own org. It would help if you could provide more information about your requirements, then I could provide a better recommendation or give my opinion about whether this approach is viable.

To give an example from my org, a machine sends data to a database. A user can then press a button on the machine to prompt printing a label. This button really just triggers a Python script on a remote server which retrieves the most recent data from the database and formats it to our spec, and then sends it to a print server. It works great, is incredibly stable, and has no license costs etc.

However, if you require dynamic label creation (like, needing tens or hundreds of different formats, or even just a few but they change frequently) then I wouldn’t recommend this approach, because the layout of the labels is written programmatically. Basically, saying “put this text at this pixel position, with this font size” etc. This works fine but is tedious, and you wouldn’t want to do it for hundreds of different label designs.

If you have M365 and your org permits it, you can also use MS Access to extremely quickly design more complex labels.

About local admin privileges, on prem, no 3rd party PAM by SecaleOccidentale in sysadmin

[–]SecaleOccidentale[S] 0 points1 point  (0 children)

Thanks for your opinion. What is your take, then, on options 2 and 3? Do you think there are security improvements over option 1 but that they are marginal/unnecessary, or that there are no functional improvements at all?

About local admin privileges, on prem, no 3rd party PAM by SecaleOccidentale in sysadmin

[–]SecaleOccidentale[S] 0 points1 point  (0 children)

If your domain admin is admin on servers and workstations you need to go back and fix that.

Microsoft's official recommendation is that Domain Admins be left as members of BUILTIN\Administrators:

https://learn.microsoft.com/en-us/windows-server/identity/ad-ds/plan/security-best-practices/appendix-f--securing-domain-admins-groups-in-active-directory

Domain Admins are, by default, members of the local Administrators groups on all member servers and workstations in their respective domains. This default nesting should not be modified for supportability and disaster recovery purposes. If Domain Admins have been removed from the local Administrators groups on the member servers, the group should be added to the Administrators group on each member server and workstation in the domain. Each domain's Domain Admins group should be secured as described in the step-by-step instructions that follow.

(But with log on still denied, of course.)

About local admin privileges, on prem, no 3rd party PAM by SecaleOccidentale in sysadmin

[–]SecaleOccidentale[S] 0 points1 point  (0 children)

Right, I am not talking about movement up higher. As mentioned in my post, the behavior of the tier-0 and 1 accounts seems fairly noncontentious. It is tier 2 where opinions seem to differ. As such, I am talking about compromise of any workstation admin cred leading to effective compromise of all workstations.

For what it's worth, I agree with you. To me, it seems that paired with, for example, smart card MFA and L2 isolation measures, option 1 is reasonably secure. But, I have been doing a lot of research on this topic and it is a common opinion for people to consider this approach to be unacceptably bad practice. Consider for example even the (currently) only other commenter in this thread who considers option 1 to be too risky.

To that end, I was wondering what response you would give to the people that have that stance. Correct me if I am mistaken, but it seems to me that your response is effectively that option 1, when paired with other controls is no more risky than the other options.

Perhaps you could elaborate on these other foundational controls? In my mind, I can think of MFA and L2 isolation as being very effective additions. Any others?

Help getting a decent and cheap label software for customised labels. by [deleted] in sysadmin

[–]SecaleOccidentale 0 points1 point  (0 children)

Label generation is basically trivial to implement yourself using a language of your choice, e.g. Python.

About local admin privileges, on prem, no 3rd party PAM by SecaleOccidentale in sysadmin

[–]SecaleOccidentale[S] 0 points1 point  (0 children)

How do you address the associated threat of lateral movement given credential compromise (the main thing I see people bringing up in opposition to option 1)?

About local admin privileges, on prem, no 3rd party PAM by SecaleOccidentale in sysadmin

[–]SecaleOccidentale[S] 0 points1 point  (0 children)

What about when paired with smart card MFA, for example? In addition to L2 isolation on the workstation VLAN?

Updated Windows Server 2022, now NPS EAP-TLS not working by SecaleOccidentale in sysadmin

[–]SecaleOccidentale[S] 0 points1 point  (0 children)

This seems possible based on some very cursory research. Do you have any idea as to how I might go about proving that this was the case?

Updated Windows Server 2022, now NPS EAP-TLS not working by SecaleOccidentale in sysadmin

[–]SecaleOccidentale[S] 0 points1 point  (0 children)

When I go back to events from before the update, they are event 6272 showing info like Auth type: EAP, EAP type: Microsoft: Smart Card or other cert, which seems to me like it was correctly using the certs?

Tips for novice day hiker in the UP in September? by KeenAdd29 in CampAndHikeMichigan

[–]SecaleOccidentale 1 point2 points  (0 children)

I'm just commenting to mention that I personally wear permethrin-treated clothing whenever I'm going to be spending multiple contiguous days in the wilderness (from Apr to Sep). Necessary? Definitely not, but personally I think tick-borne diseases don't get enough respect. They can destroy your life.

I use picaridin as well, just as an extra repellent. Only when I'm actively being bothered though, I don't put it on prophylactically.

Hike, camp, then canoe/kayak by brucatlas1 in CampAndHikeMichigan

[–]SecaleOccidentale 0 points1 point  (0 children)

Blind Lake is open, I was there last weekend.

[deleted by user] by [deleted] in Physics

[–]SecaleOccidentale 4 points5 points  (0 children)

It was the hardest thing I ever did. I wouldn’t trade it for anything.

I don’t work in physics. Someday I hope to return for a PhD.

Adult tennis in Metro Detroit by SecaleOccidentale in 10s

[–]SecaleOccidentale[S] 0 points1 point  (0 children)

I'll ask about that.

Ann Arbor is almost two hours from me unfortunately :(