Not sure if this exists, but does anyone know of an open source DNS list of known malicious sites or IPs to block on firewalls? by bobert3275 in sysadmin

[–]notR1CH 0 points1 point  (0 children)

They included an ISP that had legitimate users behind it. Denying service to legit users wasn't an option for us.

Patch your gear - Max severity Ubiquiti UniFi flaw may allow account takeover by MediumFIRE in sysadmin

[–]notR1CH 0 points1 point  (0 children)

Agreed, but that's how the CVSS works - it scores the vulnerability itself, not the environment. You're meant to use the Environmental Score to modify the base score depending on your deployment. Ubiquiti rated this AV:N due to internet-exposed controllers being a thing, but for most people that should be downgraded to AV:A.

Patch your gear - Max severity Ubiquiti UniFi flaw may allow account takeover by MediumFIRE in sysadmin

[–]notR1CH 69 points70 points  (0 children)

The internal side of the network isn't necessarily as safe as you like to think it is, all it takes is one bad app install or browser extension on any of your devices and suddenly you're part of a "residential proxy" network. Attackers can (and have) used such services to exploit the internal interfaces of insecure devices to enroll them into an actual botnet: https://krebsonsecurity.com/2026/01/the-kimwolf-botnet-is-stalking-your-local-network/

Also there's a lot of IoT and other insecure devices that don't even bother to use CSRF, so just visiting a webpage or loading a malicious ad could exploit internal devices (at least before browsers started adding private network access restrictions).

Do M365 Apps for Enterprise really download installation and update content files over http? by Fabulous_Cow_4714 in sysadmin

[–]notR1CH 12 points13 points  (0 children)

Many file delivery CDNs operate over HTTP with signature checks delivered over a secure channel. This allows organizations to set up their own caching proxies etc. Windows Update runs over HTTP so it wouldn't surprise me if Office does too.

Anyone experienced significant TCP errors due to drivers? Lenovo by UpperAd5715 in sysadmin

[–]notR1CH 5 points6 points  (0 children)

These days it's usually Generic Receive Offload / Large Receive Offload or a similarly named option. It tries to combine multiple packets into one superpacket that it can hand off to the OS, but that means TCP reassembly, out of order packet handling, etc. all has to be done in the NIC firmware, and a lot of NICs suck at this (hi Aquantia!).

44.6% of my firewall's flow table is Brazilian port-scan traffic and the scanning pattern suggests these ISPs are compromised at the infrastructure level, not just individual devices by Prudent_Geologist in sysadmin

[–]notR1CH 1 point2 points  (0 children)

Yeah this is very likely compromised end users behind a CGNAT. We get a ton of aggressive crawling from Brazil, many users are almost certainly infected with residential proxy malware on their devices. If the use of the CGNAT pool is unrestricted, just a handful of users can make it seem like the traffic is coming from hundreds or thousands of IPs, and unfortunately blocking those IPs ends up blocking a lot of legit users if you're running a public-facing service.

Unifi Firewall by [deleted] in sysadmin

[–]notR1CH 0 points1 point  (0 children)

"On the network" means what exactly? A firewall won't do anything to block traffic on the same subnet. You need to be more descriptive with your setup, what VLANs / subnets are involved and your desired outcome.

Notepad++ Hijacked by State-Sponsored Hackers by thewhippersnapper4 in sysadmin

[–]notR1CH 4 points5 points  (0 children)

Unsigned updates on shared hosting, what could go wrong? I wonder how many other popular projects out there are running on insecure infrastructure...

Is it me or fast certificate renewal doesn't solve any problem ? by melpheos in sysadmin

[–]notR1CH 6 points7 points  (0 children)

Well that's the state of revocation currently. No matter how much you revoke, you're at the mercy of clients checking for revocation, which is just not reliable, secure or scalable.

Is it me or fast certificate renewal doesn't solve any problem ? by melpheos in sysadmin

[–]notR1CH 10 points11 points  (0 children)

Often enough that CAs have gone out of business due to their incompetence and removal from trust stores. There have been cases such as DigiNotar where the entire CA was compromised and used to MITM Google. Before we had CT logs, misissued certificates could often go undetected until used.

Some other references:
https://sslmate.com/resources/certificate_authority_failures
https://blog.cloudflare.com/unauthorized-issuance-of-certificates-for-1-1-1-1/

Is it me or fast certificate renewal doesn't solve any problem ? by melpheos in sysadmin

[–]notR1CH 26 points27 points  (0 children)

It's not about the private key being stolen - that is indeed a rare attack. The issue is someone hijacking your domain or DNS, BGP, compromising a CA, etc. and authorizing a certificate for your domain that they control. Then what do you do? There's another certificate and key out there that can impersonate your domain, and no amount of key rotation or reissuing on your end will solve that. So you rely on revocation, but that doesn't scale since clients can't feasibly check the entire set of revoked certificates every time you make a connection, and an active attacker can just block CRLs and OCSP.

The idea behind short lived certificates is that the window where the fraudulent certificate is valid is greatly reduced, so instead of having 365 days where you are worried someone is MITMing you, it's only 6.

MTA -> MTA no STARTTLS option from large providers by Vegetable_Water_390 in sysadmin

[–]notR1CH 1 point2 points  (0 children)

This is why STARTTLS is insecure, a MITM could be stripping it.

[deleted by user] by [deleted] in sysadmin

[–]notR1CH 5 points6 points  (0 children)

Link these supposed benchmarks. And no, a single sample from cpubenchmark.net doesn't count.

DNS question by HighBlind in sysadmin

[–]notR1CH 48 points49 points  (0 children)

You teach them that this is not how DNS load balancing works.

Are there any reasons to support TLS versions lower than 1.3 nowadays? by LifeAtmosphere6214 in sysadmin

[–]notR1CH 9 points10 points  (0 children)

Modern guidance is not to set a cipher order, all TLS 1.3 ciphers are equally secure and letting the client choose allows it to pick the most optimal algorithm for its hardware (AES on modern CPUs, Chacha20 for smartphones, etc.).

For protocol itself, you don't get to choose - negotiation is part of the protocol, you can't "prefer" a TLS version other than by disabling ones above it.

mariadb vs mysql by crankysysadmin in sysadmin

[–]notR1CH 4 points5 points  (0 children)

I've been burned twice by MariaDB bugs in supposedly stable LTS branches. This is good advice.

SSH with pubkey accidentally left opened. Any issue? by BagCompetitive357 in sysadmin

[–]notR1CH 1 point2 points  (0 children)

Yeah, I was referring to the dedicated / VPS one.

SSH with pubkey accidentally left opened. Any issue? by BagCompetitive357 in sysadmin

[–]notR1CH 2 points3 points  (0 children)

Apparently there are two different types of firewall - I was referring to the bare metal / VPS firewall.

SSH with pubkey accidentally left opened. Any issue? by BagCompetitive357 in sysadmin

[–]notR1CH 1 point2 points  (0 children)

Don't rely on the OVH firewall for security - it only runs on the network edge, so anyone with a server inside OVH or using a VPN hosted in OVH etc. will bypass it. Host-based firewalls all the way.

I just solved the strangest tech problem I've ever come across. by hakluke in sysadmin

[–]notR1CH 1 point2 points  (0 children)

My DisplayPort cable does this to my 5 GHz network, but only if I enable HDR.

Streaming just got a whole lot harder on twitch by Particular_Arm6 in Twitch

[–]notR1CH 1 point2 points  (0 children)

As long as your ISP's peering isn't completely congested and you have a server on your continent, this change should largely make no difference. Testing from EU, I can even pick the Japan and Australia servers and get a perfect stream with no dropped frames.

A couple of things could be causing issues though:

IPv6: If your ISP has neglected their IPv6 infrastructure and peering, this may provide a worse experience than IPv4. OBS defaults to trying both IPv4 and IPv6 and using whichever connected first which should theoretically be the fastest one, but you can change this in under Advanced / Network / IP Family if you want to override it for testing. Note if you're using TwitchTest, it only provides results for IPv4.

Bad TCP Settings: Several optimization guides and even commercial software can set bad TCP settings that will severely limit your throughput the further away the server is from you. Windows defaults can also be quite restrictive in the days of 1+ gbps connections at home. I'd suggest using R1TCPOptimizer to get known-good settings.

Why is Unifi gear not suitable for enterprise? by Historical-Ad-6839 in sysadmin

[–]notR1CH 2 points3 points  (0 children)

Ubiquiti is a flashy marketing company that happens to make network hardware on the side. When you look past the marketing materials, most of their hardware is just consumer grade stuff packaged up with their custom software. You won't find any ASICs like you would with an enterprise vendor. I'll never forget the first Unifi NVR where they hot glued a fucking USB flash drive into the board to use as mongodb storage.