Michael AM Felt

Michael AM Felt




Bookmark and Share
RSS

Recent Posts

  • Determining Patching Responsibility
    03/22/2018
  • AIX, Security and the Basics
    02/27/2018
  • The Danger of SUID, and using FLRTVC to Identify Vulnerabilities
    02/08/2018
  • Revealing the Obvious in OpenSSL
    01/02/2018
  • Why I Stay Away From Using gcc (on AIX)
    10/03/2017
  • Determining Patching Responsibility

    Recent news (and my latest blogs!) have focused on the (sorry) state of patching. While this is a common state, it’s generally not the fault of the IT staff. They would love to patched to within “N-1” and have security patches installed. However, the business is (or claims to be) 25x8 and so interruptions to the business aren’t allowed and maintenance never gets done.

    Read More

    Posted: March 22, 2018 |

    AIX, Security and the Basics

    This year I have been much more active with assisting clients to get their systems secured. Securing systems begins with the basics. Administrators know this—but does the business know their risks when admins cannot do their part?
     

    Read More

    Posted: February 27, 2018 |

    The Danger of SUID, and using FLRTVC to Identify Vulnerabilities

    Earlier this week, IBM Security released a notification about “an unspecified vulnerability that would allow a locally authenticated user to obtain root." Reading deeper, it seems the programs listed (bellmail, caccelstat, iostat, lquerypv, restbyinode, and vmstat) all use “suid” to root, and are executable by anyone. 

    Read More

    Posted: February 08, 2018 |

    Revealing the Obvious in OpenSSL

    I’ve always felt that I understood the process of using OpenSSL for self-signed certificates and signing my own certificates—almost. Many times I have used a search engine to read up on “build your own ca server” and always I have not felt “this is it!” I did the same again today and, generally speaking, the results were the same: Create a self-signed certificate and use this to sign certificates.

    Read More

    Posted: January 02, 2018 |

    Why I Stay Away From Using gcc (on AIX)

    In the title I mention I stay away from gcc. There’s nothing wrong with gcc itself, but rather the maintenance of the run-time libraries.

    Read More

    Posted: October 03, 2017 |

    SUDO-RBAC Phase 1

    Last May I wrote about integrating SUDO and AIX RBAC. After months of no time I had a long weekend and can now say that “Phase 1” is complete. Phase 1 now needs testing—and ideally, feedback.

    Read More

    Posted: September 27, 2017 |

    Sweet32 Birthday! Your First Thoughts?

    My first thought was of when I was Sweet16 and had never been kissed (yeah, a bit late to that aspect of life). But I knew Sweet32 was going to be something different as I first saw the term in an AUSCERT notice.

    Read More

    Posted: September 11, 2017 |

    Security Isn’t Just Technology

    I just received an email, which has since been reported to our abuse team. This email reminds me that a pillar to security is making sure users know the telling signs of phishing, such as an email asking you to go to a special site (URL) because of new government regulations regarding password complexity.

    Read More

    Posted: September 04, 2017 |

    What OpenSSH Are You Using?

    Michael A.M. Felt discusses OpenSSH. 

    Read More

    Posted: August 17, 2017 |

    RBAC and SUDO on AIX

    I have a confession to make: Whenever I thought about SUDO I always thought in terms of SUDO versus RBAC, rather than RBAC and SUDO.

    Read More

    Posted: May 05, 2017 |

    Displaying results 1-10 (of 46)
     |<  < 1 - 2 - 3 - 4 - 5  >  >|