Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Post
  • Reply
BangersInMyKnickers
Nov 3, 2004

I have a thing for courageous dongles

RFC2324 posted:

Newer is not always better.

Cool platitude but SMB2+ is definitely better and FTP permissions are garbage.

Adbot
ADBOT LOVES YOU

Dylan16807
May 12, 2010

Furism posted:

There's no network error. The browser can reach the resources just fine, the devs apparently just decided to block "subresource" downloads if the origin URI has credentials in it. I wish I had a thread but they don't provide one. Just a warning in the console with a link to a bug page. I don't care enough to look for one since I can just switch to Firefox to access the page, I simply find their handling of that change a little bit lacking.

Edit: added screenshot and link

Blocking relative urls is a bug that they are fixing. https://bugs.chromium.org/p/chromium/issues/detail?id=731618

You can use --disable-blink-features=BlockCredentialedSubresources until then.

Absurd Alhazred
Mar 27, 2010

by Athanatos
https://twitter.com/eric_capuano/status/882086249980448769

Bunni-kat
May 25, 2010

Service Desk B-b-bunny...
How can-ca-caaaaan I
help-p-p-p you?

BangersInMyKnickers posted:

Cool platitude but SMB2+ is definitely better and FTP permissions are garbage.

I think he's referring to the printer being newer, but not better.

Because, ya know. Printers.

Solaron
Sep 6, 2007

Whatever the reason you're on Mars, I'm glad you're there, and I wish I was with you.
Haven't seen this mentioned yet - Horcrux, a password manager for paranoid users.

https://arxiv.org/pdf/1706.05085.pdf

BangersInMyKnickers
Nov 3, 2004

I have a thing for courageous dongles

Here come my terrible poasts:

BangersInMyKnickers posted:

Crypto Config Boogaloo 2017 Edition

Server 2016:

code:
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
TLS_DHE_RSA_WITH_AES_256_CBC_SHA
TLS_DHE_RSA_WITH_AES_128_CBC_SHA
TLS_RSA_WITH_AES_256_GCM_SHA384
TLS_RSA_WITH_AES_128_GCM_SHA256
TLS_RSA_WITH_AES_256_CBC_SHA256
TLS_RSA_WITH_AES_256_CBC_SHA
TLS_RSA_WITH_AES_128_CBC_SHA256
TLS_RSA_WITH_AES_128_CBC_SHA
TLS_RSA_WITH_3DES_EDE_CBC_SHA
Windows 10 (all builds):

code:
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
TLS_DHE_RSA_WITH_AES_256_CBC_SHA
TLS_DHE_DSS_WITH_AES_256_CBC_SHA256
TLS_DHE_DSS_WITH_AES_256_CBC_SHA
TLS_DHE_RSA_WITH_AES_128_CBC_SHA
TLS_DHE_DSS_WITH_AES_128_CBC_SHA256
TLS_DHE_DSS_WITH_AES_128_CBC_SHA
TLS_RSA_WITH_AES_256_GCM_SHA384
TLS_RSA_WITH_AES_128_GCM_SHA256
TLS_RSA_WITH_AES_256_CBC_SHA256
TLS_RSA_WITH_AES_256_CBC_SHA
TLS_RSA_WITH_AES_128_CBC_SHA256
TLS_RSA_WITH_AES_128_CBC_SHA
TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA
TLS_RSA_WITH_3DES_EDE_CBC_SHA
Server 2016/Win10 Curve order:

code:
nistP521
nistP384
nistP256
brainpoolP512r1
brainpoolP384r1
brainpoolP256r1
curve25519
2012R2:

code:
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P521
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P384
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256
TLS_DHE_RSA_WITH_AES_256_CBC_SHA
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P521
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P384
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256
TLS_DHE_RSA_WITH_AES_128_CBC_SHA
TLS_RSA_WITH_AES_256_GCM_SHA384
TLS_RSA_WITH_AES_128_GCM_SHA256
TLS_RSA_WITH_AES_256_CBC_SHA256
TLS_RSA_WITH_AES_256_CBC_SHA
TLS_RSA_WITH_AES_128_CBC_SHA256
TLS_RSA_WITH_AES_128_CBC_SHA
TLS_RSA_WITH_3DES_EDE_CBC_SHA
Win8.1

code:
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384_P384
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256_P384
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256_P256
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P384
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256
TLS_DHE_RSA_WITH_AES_256_CBC_SHA
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P384
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256
TLS_DHE_DSS_WITH_AES_256_CBC_SHA256
TLS_DHE_DSS_WITH_AES_256_CBC_SHA
TLS_DHE_RSA_WITH_AES_128_CBC_SHA
TLS_DHE_DSS_WITH_AES_128_CBC_SHA256
TLS_DHE_DSS_WITH_AES_128_CBC_SHA
TLS_RSA_WITH_AES_256_GCM_SHA384
TLS_RSA_WITH_AES_128_GCM_SHA256
TLS_RSA_WITH_AES_256_CBC_SHA256
TLS_RSA_WITH_AES_256_CBC_SHA
TLS_RSA_WITH_AES_128_CBC_SHA256
TLS_RSA_WITH_AES_128_CBC_SHA
TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA
TLS_RSA_WITH_3DES_EDE_CBC_SHA
Server 2012:

code:
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P521
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P384
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P521
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P384
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256
TLS_RSA_WITH_AES_256_GCM_SHA384
TLS_RSA_WITH_AES_128_GCM_SHA256
TLS_RSA_WITH_AES_256_CBC_SHA256
TLS_RSA_WITH_AES_256_CBC_SHA
TLS_RSA_WITH_AES_128_CBC_SHA256
TLS_RSA_WITH_AES_128_CBC_SHA
TLS_RSA_WITH_3DES_EDE_CBC_SHA
Win8:

code:
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384_P384
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256_P384
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256_P256
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P384
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P384
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256
TLS_DHE_DSS_WITH_AES_256_CBC_SHA256
TLS_DHE_DSS_WITH_AES_256_CBC_SHA
TLS_DHE_DSS_WITH_AES_128_CBC_SHA256
TLS_DHE_DSS_WITH_AES_128_CBC_SHA
TLS_RSA_WITH_AES_256_GCM_SHA384
TLS_RSA_WITH_AES_128_GCM_SHA256
TLS_RSA_WITH_AES_256_CBC_SHA256
TLS_RSA_WITH_AES_256_CBC_SHA
TLS_RSA_WITH_AES_128_CBC_SHA256
TLS_RSA_WITH_AES_128_CBC_SHA
TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA
TLS_RSA_WITH_3DES_EDE_CBC_SHA
Server 2008R2:

code:
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P521
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P384
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256
TLS_DHE_RSA_WITH_AES_256_CBC_SHA
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P521
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P384
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256
TLS_DHE_RSA_WITH_AES_128_CBC_SHA
TLS_RSA_WITH_AES_256_CBC_SHA256
TLS_RSA_WITH_AES_256_CBC_SHA
TLS_RSA_WITH_AES_128_CBC_SHA256
TLS_RSA_WITH_AES_128_CBC_SHA
TLS_RSA_WITH_3DES_EDE_CBC_SHA
Win7:

code:
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384_P521
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384_P384
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P521
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P384
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256
TLS_DHE_RSA_WITH_AES_256_CBC_SHA
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256_P521
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256_P384
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256_P256
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P521
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P384
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256
TLS_DHE_RSA_WITH_AES_128_CBC_SHA
TLS_RSA_WITH_AES_256_CBC_SHA256
TLS_RSA_WITH_AES_256_CBC_SHA
TLS_RSA_WITH_AES_128_CBC_SHA256
TLS_RSA_WITH_AES_128_CBC_SHA
TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA
TLS_RSA_WITH_3DES_EDE_CBC_SHA
Server 2008:

code:
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA_P521
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA_P384
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA_P256
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA_P521
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA_P384
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA_P256
TLS_RSA_WITH_AES_256_CBC_SHA
TLS_RSA_WITH_AES_128_CBC_SHA
TLS_RSA_WITH_3DES_EDE_CBC_SHA
Vista:
code:
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA_P521
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA_P384
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA_P256
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA_P521
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA_P384
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA_P256
TLS_DHE_DSS_WITH_AES_256_CBC_SHA
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA_P521
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA_P384
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA_P256
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA_P521
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA_P384
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA_P256
TLS_DHE_DSS_WITH_AES_128_CBC_SHA
TLS_RSA_WITH_AES_256_CBC_SHA
TLS_RSA_WITH_AES_128_CBC_SHA
TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA
TLS_RSA_WITH_3DES_EDE_CBC_SHA
OpenSSL 1.0.x-1.1.x
code:
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
TLS_DHE_RSA_WITH_AES_256_CBC_SHA
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
TLS_DHE_RSA_WITH_AES_128_CBC_SHA
TLS_RSA_WITH_AES_256_GCM_SHA384
TLS_RSA_WITH_AES_128_GCM_SHA256
TLS_RSA_WITH_AES_256_CBC_SHA256
TLS_RSA_WITH_AES_256_CBC_SHA
TLS_RSA_WITH_AES_128_CBC_SHA256
TLS_RSA_WITH_AES_128_CBC_SHA
TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA
TLS_RSA_WITH_3DES_EDE_CBC_SHA


BangersInMyKnickers posted:

I'm dropping DSA/DSS ciphers from servers because TLS1.3 goes RSA-only and your CA probably isn't issuing DSA certs anyway. Still on for clients for compatibility reasons.

The channel config for Win8/8.1 dropped the P521 curves. There's a character limit you bump in to for the group policy object and I am trying to work around that. Win10 split the curve definitions out in to its own policy so you don't have the same limit issues. P521 seems to be falling out of favor for whatever reason though I still prefer it in most situations.

The Win8.1 and 2012R2 config should work on 8 and 2012 respectively without issue, there's just an extra two DHE_RSA suites included that will be ignored. But you can mange independent GPOs for each if you want.

3DES is pretty much only needed for XP/2003/IE compatibility. Feel free to drop it if you think those clients should gently caress off.

anthonypants
May 6, 2007

by Nyc_Tattoo
Dinosaur Gum
Hey speaking of certs, https://twitter.com/letsencrypt/status/882985570401701888

Lain Iwakura
Aug 5, 2004

The body exists only to verify one's own existence.

Taco Defender

:toot:

BangersInMyKnickers
Nov 3, 2004

I have a thing for courageous dongles

LetsEncrypt Wildcard Certificates™, Brought to you by the NSA

XenJ
Aug 1, 2014

BangersInMyKnickers posted:

LetsEncrypt Wildcard Certificates™, Brought to you by the NSA

Oh no. Come on. From what I know LetsEncrypet changed a lot in a good way.

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

Bangers just doesn't like wild cards because they tempt people into sloppy key management practices or something. LE is pretty much the hardest US-based CA for intelligence to subvert, given how it's structured and staffed around transparency.

Kazinsal
Dec 13, 2011



TBH I'd be okay with the NSA giving out free wildcards if it would mean people would finally stop doing logins and poo poo over plain HTTP.

It's all about the Mossad/Not-Mossad threat model, and logins over plain HTTP falls squarely in the not-Mossad category.

EVIL Gibson
Mar 23, 2001

Internet of Things is just someone else's computer that people can't help attaching cameras and door locks to!
:vapes:
Switchblade Switcharoo

Subjunctive posted:

Bangers just doesn't like wild cards because they tempt people into sloppy key management practices or something. LE is pretty much the hardest US-based CA for intelligence to subvert, given how it's structured and staffed around transparency.

If they enforce that common mistakes with wildcards don't happen on creation, it will certainly be heads above a lot of other registers.

Double Punctuation
Dec 30, 2009

Ships were made for sinking;
Whiskey made for drinking;
If we were made of cellophane
We'd all get stinking drunk much faster!

BangersInMyKnickers posted:

Here come my terrible poasts:

Serious question: Why are the lovely NIST curves still above 25519? Most of the RFCs for it are either published or in the queue.

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

"In the queue" isn't really compelling in a lot of environments.

CLAM DOWN
Feb 13, 2007




I don't like wildcard certs because they encourage lazy, sloppy practices but more HTTPS everywhere is a very good thing.

vOv
Feb 8, 2014

What's the problem with wildcard certs? Is it just the idea that if you have multiple domains then they're probably running on separate servers (physical or virtual) and compromising one shouldn't compromise the other, or is there something else to it?

Jabor
Jul 16, 2010

#1 Loser at SpaceChem

vOv posted:

What's the problem with wildcard certs? Is it just the idea that if you have multiple domains then they're probably running on separate servers (physical or virtual) and compromising one shouldn't compromise the other, or is there something else to it?

A lot of systems involve one server being set up as aservice.whatever, a different one being anotherservice.whatever, and so on. The right way to set up that situation is to create one certificate for each service, and only distribute the corresponding keys to the servers that need them. Non-wildcard certificates encourage this, because standing up a service already involves getting a certificate signed for that domain. Wildcard certificates encourage people to be lazy, create a single wildcard certificate, and use the same key for every server.

Wildcards can make sense in other situations, like if you're terminating all your ssl connections at the same load balancer anyway. But:
- if you're doing that already, you're not the sort of organisation Let's Encrypt is targeting
- if you're setting up ssl for the first time, you can just load-balance encrypted connections based on sni and do it the right way instead
So this doesn't meaningfully help with ssl usage, while encouraging organisations to use broken processes instead of doing it right.

Furism
Feb 21, 2006

Live long and headbang
Honestly with the certbot tool I don't even understand why LE is doing this. It makes generating and installing new certificates The Right Way extremely easy and in that case I believe people are trading too much of security for convenience.

Methylethylaldehyde
Oct 23, 2004

BAKA BAKA

Furism posted:

Honestly with the certbot tool I don't even understand why LE is doing this. It makes generating and installing new certificates The Right Way extremely easy and in that case I believe people are trading too much of security for convenience.

Why are wildcards so bad?

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

Because slack shouldn't be allowed to generate domains like it does without instantly getting issued and deploying a new cert to all its https terminators.

(Wild cards are fine.)

Furism
Feb 21, 2006

Live long and headbang

Methylethylaldehyde posted:

Why are wildcards so bad?

I think the tighter the certificates are, the less value each of them has. I think that's desirable but if a company has got top-notch security and is confident they can handle it then fine I guess.

Subjunctive posted:

Because slack shouldn't be allowed to generate domains like it does without instantly getting issued and deploying a new cert to all its https terminators.

(Wild cards are fine.)

To be honest it'd be pretty easy to automate that. And in a SDN world pushing certs isn't a big deal.

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

Furism posted:

To be honest it'd be pretty easy to automate that. And in a SDN world pushing certs isn't a big deal.

Who is going to turn around issued certs sub-second (maybe LE, maybe)? When you enter your server name to create a server on slack, https://furismrocks.slack.com works instantly, it's part of the flow.

I'm not sure how SDN affects cert deployment here, could you elaborate? I don't remember exactly how long it took to roll a new cert at Facebook, but it definitely wasn't fast.

Methylethylaldehyde
Oct 23, 2004

BAKA BAKA
I'll literally be using it to secure a lovely self-hosted webpage and possible my RDP-gateway server. Possibly an exchange instance if I decide I really do in fact hate myself.

Diametunim
Oct 26, 2010
Is anyone in here running an IDS/IPS setup on their home network? If so what's your setup like? I'm planning on moving forward with setting up a little home lab and monitoring traffic on my local lan as well as outside my firewall using Security Onion. Just need to pick up a new nic and more memory first.

Docjowles
Apr 9, 2009

Methylethylaldehyde posted:

I'll literally be using it to secure a lovely self-hosted webpage and possible my RDP-gateway server. Possibly an exchange instance if I decide I really do in fact hate myself.

For home use it doesn't loving matter at all. Your random home lab gear sharing a private key is not going to be the chink in the armor that brings your life crashing down.

CLAM DOWN
Feb 13, 2007




https://www.youtube.com/watch?v=FUyaItsRInQ

next

gen

Internet Explorer
Jun 1, 2005






nope nope nope

Kazinsal
Dec 13, 2011




It's all Juniper and WatchGuard for me from now on :stare:

Thanks Ants
May 21, 2004

#essereFerrari


Mr Chips
Jun 27, 2007
Whose arse do I have to blow smoke up to get rid of this baby?
Cylance is a load of bollocks, isn't it? The information I can get about it is horribly vague, but couple of our assistant directors are carrying on like it's a silver bullet for windows client security after going to a Dell pissup.

Internet Explorer
Jun 1, 2005





I don't know much about Cylance, but I remember reading this article, which raised an eyebrow.

https://arstechnica.com/information-technology/2017/04/the-mystery-of-the-malware-that-wasnt/

Lain Iwakura
Aug 5, 2004

The body exists only to verify one's own existence.

Taco Defender
Cylance is crap. If you go with them you'll never be able to talk about how much crap they are.

Methylethylaldehyde
Oct 23, 2004

BAKA BAKA

Lain Iwakura posted:

Cylance is crap. If you go with them you'll never be able to talk about how much crap they are.

Any software that comes with a complementary gag order is something you should avoid.

Furism
Feb 21, 2006

Live long and headbang

Fortinet devices are pretty good but god drat this is hard to watch.

Furism
Feb 21, 2006

Live long and headbang
My company decided to go ahead with Druva as a backup solution. Fine. Thing is, they configured the software so that every single file under the user profile is backed up. Being a systems engineer I have a lot of 4GB+ firmware files stored on my laptop for when I visit customers, need to connect to legacy systems to upgrade them, etc.. So overall I have around 400 GB worth of files, with only about 50 GB of files actually worth backing up (the rest being firmware files already on our CDN anyway). I complained about this (even with a 100 Mbps uplink at the office it's going to take forever to upload 400 GB - 5.2 years yesterday when I checked ; yeah I think Druva's side isn't super fast) and now IT tells me to store the files somewhere like C:\firmwares. I'm fairly sure that's against some recommended best practice from Microsoft and that the only place we should put files on a Windows systems is under C:\Users\<myUser>\.

Is this just me imagining things or is it ok to store (non-confidential) files outside of my user's home?

DumbWhiteGuy
Jul 4, 2007

You need haters. Fellas if you got 20 haters, you need 40 of them motherfuckers. If there's any haters in here that don't have nobody to hate on, feel free to hate on me

Lain Iwakura posted:

Cylance is crap. If you go with them you'll never be able to talk about how much crap they are.

I was shocked that they are on VT now.

rafikki
Mar 8, 2008

I see what you did there. (It's pretty easy, since ducks have a field of vision spanning 340 degrees.)

~SMcD


Furism posted:

My company decided to go ahead with Druva as a backup solution. Fine. Thing is, they configured the software so that every single file under the user profile is backed up. Being a systems engineer I have a lot of 4GB+ firmware files stored on my laptop for when I visit customers, need to connect to legacy systems to upgrade them, etc.. So overall I have around 400 GB worth of files, with only about 50 GB of files actually worth backing up (the rest being firmware files already on our CDN anyway). I complained about this (even with a 100 Mbps uplink at the office it's going to take forever to upload 400 GB - 5.2 years yesterday when I checked ; yeah I think Druva's side isn't super fast) and now IT tells me to store the files somewhere like C:\firmwares. I'm fairly sure that's against some recommended best practice from Microsoft and that the only place we should put files on a Windows systems is under C:\Users\<myUser>\.

Is this just me imagining things or is it ok to store (non-confidential) files outside of my user's home?

I'm not sure about the recommended stuff, but we use Druva too. Every time I extract some big logs files I have to remember to use something like c:/logfiles or deal with annoying out of space alerts and emails for a few days too.

EssOEss
Oct 23, 2006
128-bit approved

Furism posted:

Is this just me imagining things or is it ok to store (non-confidential) files outside of my user's home?

As long as the ACLs on these directories are configured according to your needs and any software that you have running does not go looking for these files elsewhere, sure go right ahead.

Adbot
ADBOT LOVES YOU

Volmarias
Dec 31, 2002

EMAIL... THE INTERNET... SEARCH ENGINES...

Furism posted:

yeah I think Druva's side isn't super fast) and now IT tells me to store the files somewhere like C:\firmwares. I'm fairly sure that's against some recommended best practice from Microsoft and that the only place we should put files on a Windows systems is under C:\Users\<myUser>\.

Is this just me imagining things or is it ok to store (non-confidential) files outside of my user's home?

If you are asking from the "will this break anything" side, it's totally fine to place your files under some random root directory. If you're used to Linux et all, Windows basically mounts the hard disk whole, excepting some boot data that is totally transparent to the end user. While programs SHOULD look in the user's home directory, there's no need for them to do so. If this is a laptop that only you will use, there aren't permissions concerns to worry about here.

From a "is this a nice thing to do" perspective it's a little gross but still very much the norm in many places.

  • 1
  • 2
  • 3
  • 4
  • 5
  • Post
  • Reply