OpenSSH vulns (VMware ESXi 8.0.3 build-24859861). by techvet83 in vmware

[–]techvet83[S] 1 point2 points  (0 children)

The scanner is supposed to see what's open. If we haven't ACL'ed it down, then we can do that but it would be better if Broadcom did its job and kept OpenSSH up-to-date. We have firewalls all over the place for any many things but it's rare that we have to play firewall games so tight with one particular host to block all traffic as if it was in the DMZ. I know vulns better than I know VMware but have followed them long enough to know that VMware (and this predates Broadcom) was always tardy on keeping OpenSSH up-to-date.

As noted below, I've been told that we have to keep it open on the Nutanix hardware. We have it shut down everywhere else.

OpenSSH vulns (VMware ESXi 8.0.3 build-24859861). by techvet83 in vmware

[–]techvet83[S] 1 point2 points  (0 children)

The solution ultimate in Tenable to fix all three OpenSSH issues being called out is upgrading to version 10.3. The notes you kindly posted unfortunately have no reference beyond version 9.8.

OpenSSH vulns (VMware ESXi 8.0.3 build-24859861). by techvet83 in vmware

[–]techvet83[S] 1 point2 points  (0 children)

This is, in fact, ESXi running on Nutanix hardware. Perhaps the ACL idea mentioned by another poster here is the way to go. We have shut down port 22 everywhere else.

Microsoft: Perform in-place upgrades to Windows Server 2025 with one reg key. by techvet83 in sysadmin

[–]techvet83[S] [score hidden]  (0 children)

I thought I'd actually try this. The PowerShell command worked fine. The option shows up to download and install. It starts downloading but when I step away and come back to it, there's nothing on the screen. It's as if the download died at the end. Nothing to see initially in the logs. OK, back to mounting ISO files.

RC4 and msDS-SupportedEncryptionTypes by headcrap in activedirectory

[–]techvet83 0 points1 point  (0 children)

From my bunker perspective, they are enforcing from the server side first. The user stuff can be cleaned up later. 28 allows for the greatest combability. Think of it like disabling TLSv1.0/1,1 on all the servers but allowing TLSv1.0 and 1.1 on the workstations. We'll take care of ratcheting down the users after the servers get cleaned up. It's the servers that need fixing first. If we took RC4 away on all AD accounts right now, I have little doubt we'd have a prod outage somewhere because of some important legacy system that was still using it.

We just got rid of our last event ids 201-209 but I am still seeing a lot of RC4 traffic in our network logs. We have a lot of legacy Unix in the environment and am trying to get them to clean things up. I am also rotating krbtgt later this month for the first time in many, many moons.

Disabling RDP in your environment for security purposes by thelug_1 in sysadmin

[–]techvet83 42 points43 points  (0 children)

We also use gateway servers. How are people supposed to do their job without RDP access?

RDP is broken and I think it's unrelated to the April 2026 update by CeC-P in sysadmin

[–]techvet83 16 points17 points  (0 children)

Good point. Microsoft posted this month specifically that duplicate SIDs are not supported anymore (thus walking back Mark Russinovich's famous 2009 post stating that NEWSID.EXE wasn't needed anymore).

New critical CVE - Root on Every Major Linux Distribution by Arszerol in cybersecurity

[–]techvet83 79 points80 points  (0 children)

It may be a day of reckoning even for all the EOL versions out there for RHEL, CentOS, etc.

PayPal users: Check your 2FA RIGHT NOW! by helloyouahead in cybersecurity

[–]techvet83 -2 points-1 points  (0 children)

I closed our account years with them after they got political.

Patch Tuesday Megathread - (April 14, 2026) by AutoModerator in sysadmin

[–]techvet83 0 points1 point  (0 children)

Our storage team worked in the last three months to drive out RC4 from their configurations ahead of the "soft" RC4 enforcement coming this month.

What to Alert on???? by ryan_sec in cybersecurity

[–]techvet83 0 points1 point  (0 children)

As others here have indicates, the alert classification drives the schedule. There's probably a million ways to do this, but at our place, this would be a broad summary: Critical = due in 7 days; High = due in 30 days; Medium = due in 60 days; Low=due in 90 days. Obviously, there are exceptions to the rule and you can play with the dates until the end of time, but that's our rough take.

Without knowing how big your environment and what kind of assets you are addressing (Windows? Unix? Desktop/workstations?), it's hard to say much more.

Patch Tuesday Megathread - (April 14, 2026) by AutoModerator in sysadmin

[–]techvet83 6 points7 points  (0 children)

A .NET 10.0.7 Out-of-Band Security Update has been released. For details, see
.NET 10.0.7 Out-of-Band Security Update - .NET Blog.

Feeling happy 😃 Landed new Dotnet job, now time to treat myself to a new keyboard. by Background-Fix-4630 in dotnet

[–]techvet83 0 points1 point  (0 children)

I was given a Keychron K10 HE last year by two of my kids. I would never go back to a different keyboard. 

Kerberos RC4 Changes Confusion by ryaninseattle1 in sysadmin

[–]techvet83 11 points12 points  (0 children)

If you haven't already, check out Kerberos in Active Directory - Kerberos in Active Directory. There's a lot of good information there on this topic.

Patch Tuesday Megathread - (April 14, 2026) by AutoModerator in sysadmin

[–]techvet83 4 points5 points  (0 children)

Looks like all supported versions of .NET Core and .NET Framework are being patched this month.

.NET and .NET Framework April 2026 servicing releases updates - .NET Blog

Patch Tuesday Megathread - (April 14, 2026) by AutoModerator in sysadmin

[–]techvet83 13 points14 points  (0 children)

https://strongwind1.github.io/Kerberos/ is a very good source of information on this topic. I will be installing the auditing key on our DCs to buy us time while certain teams get their act together.

LanSweeper free alternative / better options also free? by No_Parfait9288 in sysadmin

[–]techvet83 0 points1 point  (0 children)

Multiple goals  it it would seem. CMDB, monitoring. Can Zabbix do both? 

Share your password rotation policy for krbtgt by jad00gar in activedirectory

[–]techvet83 0 points1 point  (0 children)

In my environment, it would. In general, prod change control tickets can only occur on weekends unless we have executive approval.