Michael AM Felt

Michael AM Felt

Bookmark and Share

Recent Posts

  • Revealing the Obvious in OpenSSL
  • Why I Stay Away From Using gcc (on AIX)
  • SUDO-RBAC Phase 1
  • Sweet32 Birthday! Your First Thoughts?
  • Security Isn’t Just Technology
  • SSL – You Have a Choice Very Soon!

    First thing: What’s in a name? We generally speak and write SSL, but what we really should mean is TLS. For this blog, I shall continue this convention of SSL but soon I shall speak TLS only!

    Read More

    Posted: February 17, 2015 |

    Things To Have Done Early in 2015

    Happy New Year! I wanted to provide you with a checklist of things you should do early this year. Here’s the list and then I’ll dive deeper into each item:

    1. Activate aixpert at level medium or stricter.
    2. Review or configure syslog.
    3. Review or configure audit.
    4. Set password algorithm to ssha256.
    5. Disable login/su for “idle” accounts.

    Read More

    Posted: January 15, 2015 |

    Aixpert, the Low-Hanging Fruit

    I was daydreaming while enjoying a coffee. My thoughts this morning were about a whitepaper on sudo. I wonder what people are saying about sudo these days?

    Read More

    Posted: December 15, 2014 |

    Still Breathing

    Still breathing... This year has been - different - for me. Generally speaking, my trips to customers are about 25% security related, and the rest is performance related. This year has been too light as far as security is concerned. 

    Read More

    Posted: December 04, 2014 |

    Use Dual-Key Authentication for Special Accounts

    A question about the risk of being able to login as root either remotely or limited to the (virtual) console came up on a discussion group in LinkedIn recently. Ideally, there is no need to ever login as root (the big question or risk being: who is root today). Instead, users should be logging as as themselves and then using a mechanism to switchuser (su, sudo, super, etc.) to root.

    Read More

    Posted: October 20, 2014 |

    My Role-Based Security Questions for You

    This year has been difficult for me to be "security minded." Besides security, I also do performance trouble-shooting and consultancy and this year that has kept me very busy. So, I do not feel like I have anything "new and improved" to share with you about how to improve the AIX security layer.

    Read More

    Posted: July 14, 2014 |

    What Good Are Intentions?

    Time just keeps slipping by. This feels like a New Years best-intention gone bad. Three times before I have started a SecuringAIX blog and three times I have not finished.

    So today must be different. I must finish this blog entry – anything will be better than nothing.

    Read More

    Posted: June 10, 2014 |

    What Does It Take for Security to Get Management Attention?

    What does it take to get management's attention, to get the higher ups to be serious about getting something done with securing systems?

    I really enjoy discussing and implementing systems security.

    Read More

    Posted: December 17, 2013 |

    Are You Being Naughty?

    I have an AIX server—on the Internet—and I have been naughty! Shame on me!

    My intent is that this server  is  “open” just enough so "random" activity looking for servers to breach does not take it down. I say "random" because I doubt my ISP would be happy if I were the target of directed or sustained attacks. So, I try not to be too inviting.

    Read More

    Posted: October 14, 2013 |

    Improve Your Password-Hashing Algorithms

    Recently, I was at a customer site where I heard a conversation between an AIX admin and a Linux admin who were discussing their concerns regarding password-hash compatibility with Linux, active directory (AD) lightweight directory access protocol (LDAP) passwords and AIX.

    Read More

    Posted: September 23, 2013 |

    Displaying results 21-30 (of 43)
     |<  <  1 - 2 - 3 - 4 - 5  >  >|