home.social

#linuxadmin — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #linuxadmin, aggregated by home.social.

  1. I've been hosting more of my own stuff over time, but keeping up with the maintenance manually has been proving to be too much. I remember 100 years ago as a sysadmin setting up an Ubuntu management server to manage the fleet of Ubuntu servers at work in the style of the Red Hat stuff that did the same. Now I run a variety of instances, and I don't know what kind of orchestration machine I would need to spin up to keep things like OPNsense, remote *nix hosts, etc. up to date. Any recommendations?

    My goal is to use only FOSS whenever possible (leaning towards things on Starlight's NO AI list so I can avoid slopcode running in my network wherever possible.

    #selfhosting #selfhosted #selfhost #askfedi #sysadmin #linuxadmin

  2. And here's another one:
    github.com/0xdeadbeefnetwork/C

    This one is not fixed by f4c50a40, so all current kernels are vulnerable. Looks like mitigation is possible by blocking kernel modules `esp4` + `esp6` here as well (and breaking #IPSec in doing so). Can someone confirm?

    Why is it called "Electric Boogaloo"… is this a #DonaldByrd fan? Were they inspired by this week's @thekalimerashow shows??

    #privilegeescalation #linux #vulnerability #linuxadmin #sysadmin #exploit #copyfail2 #electricboogaloo

  3. And here's another one:
    github.com/0xdeadbeefnetwork/C

    This one is not fixed by f4c50a40, so all current kernels are vulnerable. Looks like mitigation is possible by blocking kernel modules `esp4` + `esp6` here as well (and breaking #IPSec in doing so). Can someone confirm?

    Why is it called "Electric Boogaloo"… is this a #DonaldByrd fan? Were they inspired by this week's @thekalimerashow shows??

    #privilegeescalation #linux #vulnerability #linuxadmin #sysadmin #exploit #copyfail2 #electricboogaloo

  4. And here's another one:
    github.com/0xdeadbeefnetwork/C

    This one is not fixed by f4c50a40, so all current kernels are vulnerable. Looks like mitigation is possible by blocking kernel modules `esp4` + `esp6` here as well (and breaking #IPSec in doing so). Can someone confirm?

    Why is it called "Electric Boogaloo"… is this a #DonaldByrd fan? Were they inspired by this week's @thekalimerashow shows??

    #privilegeescalation #linux #vulnerability #linuxadmin #sysadmin #exploit #copyfail2 #electricboogaloo

  5. And here's another one:
    github.com/0xdeadbeefnetwork/C

    This one is not fixed by f4c50a40, so all current kernels are vulnerable. Looks like mitigation is possible by blocking kernel modules `esp4` + `esp6` here as well (and breaking #IPSec in doing so). Can someone confirm?

    Why is it called "Electric Boogaloo"… is this a #DonaldByrd fan? Were they inspired by this week's @thekalimerashow shows??

    #privilegeescalation #linux #vulnerability #linuxadmin #sysadmin #exploit #copyfail2 #electricboogaloo

  6. And here's another one:
    github.com/0xdeadbeefnetwork/C

    This one is not fixed by f4c50a40, so all current kernels are vulnerable. Looks like mitigation is possible by blocking kernel modules `esp4` + `esp6` here as well (and breaking #IPSec in doing so). Can someone confirm?

    Why is it called "Electric Boogaloo"… is this a #DonaldByrd fan? Were they inspired by this week's @thekalimerashow shows??

    #privilegeescalation #linux #vulnerability #linuxadmin #sysadmin #exploit #copyfail2 #electricboogaloo

  7. Here we go again :-/ Another deterministic #privilegeescalation bug in the #Linux kernel. Make sure you're using at least the following version of your branch to mitigate against #dirtyfrag:

    - 7.0.5
    - 6.18.28
    - 6.12.87
    - 6.6.138
    - 6.1.171
    - 5.15.205
    - 5.10.255

    6.19 is eol, so it probably won't get patched. Remove and blocklist the following modules if you have to use an unpatched kernel: esp4 esp6 rxrpc

    See github.com/V4bel/dirtyfrag/blo for more info.

    #vulnerability #linuxadmin #sysadmin #exploit

  8. Here we go again :-/ Another deterministic #privilegeescalation bug in the #Linux kernel. Make sure you're using at least the following version of your branch to mitigate against #dirtyfrag:

    - 7.0.5
    - 6.18.28
    - 6.12.87
    - 6.6.138
    - 6.1.171
    - 5.15.205
    - 5.10.255

    6.19 is eol, so it probably won't get patched. Remove and blocklist the following modules if you have to use an unpatched kernel: esp4 esp6 rxrpc

    See github.com/V4bel/dirtyfrag/blo for more info.

    #vulnerability #linuxadmin #sysadmin #exploit

  9. Here we go again :-/ Another deterministic #privilegeescalation bug in the #Linux kernel. Make sure you're using at least the following version of your branch to mitigate against #dirtyfrag:

    - 7.0.5
    - 6.18.28
    - 6.12.87
    - 6.6.138
    - 6.1.171
    - 5.15.205
    - 5.10.255

    6.19 is eol, so it probably won't get patched. Remove and blocklist the following modules if you have to use an unpatched kernel: esp4 esp6 rxrpc

    See github.com/V4bel/dirtyfrag/blo for more info.

    #vulnerability #linuxadmin #sysadmin #exploit

  10. Here we go again :-/ Another deterministic #privilegeescalation bug in the #Linux kernel. Make sure you're using at least the following version of your branch to mitigate against #dirtyfrag:

    - 7.0.5
    - 6.18.28
    - 6.12.87
    - 6.6.138
    - 6.1.171
    - 5.15.205
    - 5.10.255

    6.19 is eol, so it probably won't get patched. Remove and blocklist the following modules if you have to use an unpatched kernel: esp4 esp6 rxrpc

    See github.com/V4bel/dirtyfrag/blo for more info.

    #vulnerability #linuxadmin #sysadmin #exploit

  11. Here we go again :-/ Another deterministic #privilegeescalation bug in the #Linux kernel. Make sure you're using at least the following version of your branch to mitigate against #dirtyfrag:

    - 7.0.5
    - 6.18.28
    - 6.12.87
    - 6.6.138
    - 6.1.171
    - 5.15.205
    - 5.10.255

    6.19 is eol, so it probably won't get patched. Remove and blocklist the following modules if you have to use an unpatched kernel: esp4 esp6 rxrpc

    See github.com/V4bel/dirtyfrag/blo for more info.

    #vulnerability #linuxadmin #sysadmin #exploit

  12. I couldn't find a list of #Linux #kernel versions that include a patch for #copyfail, so I dug into the commit log and made one. Make sure you're using at least the following version of your branch to mitigate against copyfail:

    - 7.0-rc7 (any stable 7.x is safe)
    - 6.19.12
    - 6.18.22
    - 6.12.85
    - 6.6.137
    - 6.1.170
    - 5.15.204
    - 5.10.254

    See copy.fail for more info about the #exploit.

    #privilegeescalation #vulnerability #cryptography #linuxadmin #sysadmin

  13. Before troubleshooting any Linux system, I run these commands. An 8-step Linux triage checklist with exact flags and what to do when you find a problem.

    Read full guide here: ostechnix.com/linux-troublesho

    #Linuxtroubleshooting #Linuxadmin #Linuxhowto #Linuxcommands

  14. 🧑‍💻 Built your own MFA system yet?

    We just dropped a full walkthrough on how to integrate Google Authenticator into RELIANOID’s MFA portal — with secrets stored in AD or LDAP.

    🔐 Based on TOTP
    🛡️ Validates tokens post-login
    📱 Generates QR codes for new users

    It’s secure, scalable, and open-source-friendly.

    📖 Dive in:

    relianoid.com/resources/knowle

  15. Setting up DNS over HTTPS (DoH) is so much more complicated than DNS over TLS (DoT) :blobcatthinking:

    Funny enough Mozilla Firefox :firefox: supports DoH and sets it up on application level, while Android :android: uses DoT on operating system level :blobcatnerd:

    #itsalwaysdns #dns #dot #doh #sysadmin #linuxadmin

  16. How come we still don't have anything simpler to configure a bludy #UPS! Damn it!

    #homelab #linuxAdmin #NUT

  17. How come we still don't have anything simpler to configure a bludy #UPS! Damn it!

    #homelab #linuxAdmin #NUT

  18. How come we still don't have anything simpler to configure a bludy #UPS! Damn it!

    #homelab #linuxAdmin #NUT

  19. How come we still don't have anything simpler to configure a bludy #UPS! Damn it!

    #homelab #linuxAdmin #NUT

  20. How come we still don't have anything simpler to configure a bludy #UPS! Damn it!

    #homelab #linuxAdmin #NUT

  21. Complete tload command guide for Linux. Monitor CPU load average with live ASCII graphs. Installation, usage examples, and comparison with top, htop and uptime Commands.

    Full guide here: ostechnix.com/tload-command-li

    #tload #LinuxSystemLoad #Linuxhowto #Linuxadmin #Linuxcommands #CPULoad

  22. Elimination is the key...wondering what could be done to streamline 🤔

  23. Learn how to install, configure, and secure SSH on Debian 13. Complete guide with SSH keys, firewall setup, and fail2ban protection.

    Step-by-Step tutorial: ostechnix.com/set-up-configure

    #SSH #SecureShell #Debian13 #Linux #Security #SSHHardening #Linuxadmin #Linuxhowto #Fail2ban #UFW #Firewall

  24. Learn how the Linux file command reveals the real file type, detects MIME types, inspects archives, and fixes real admin problems.

    Full Tutorial: ostechnix.com/linux-file-comma

    #file #filetype #linux #linuxcommands #linuxbasics #linuxadmin #linuxhowto

  25. Logs, databases, and caches grow under /var. Learn why Linux admins monitor the /var directory to prevent disk issues and service failures.

    Full guide here: ostechnix.com/why-linux-admins

    #Logs #Var #Linuxadmin #Diskusage #Linuxhowto #Linuxcommands

  26. GNOME Boxes: Schlanke Virtualisierung für den Linux-Desktop (und warum es für Admins trotzdem spannend ist)

    Einleitung Virtualisierung unter Linux ist längst kein Nischenthema mehr – vom Heim-Server bis zur Enterprise-Umgebung gehören virtuelle Maschinen zum Alltag. Während Tools wie virt-manager, VirtualBox oder VMware Pro jede Menge Schalter und Hebel für Admins bieten, fühlt sich das für einfache Tests oft wie Overkill an. Genau hier setzt GNOME Boxes an: Eine minimalistische, aber ernstzunehmende Oberfläche für KVM/QEMU, die Virtualisierung auf dem Linux-Desktop radikal […]

    andreas-moor.de/gnome-boxes-sc

  27. Secure Shell is an essential tool for remote system administration. Learn how to set up and configure SSH on Fedora Linux 43.

    Step-by-Step Guide: ostechnix.com/set-up-configure

    #SSH #SecureShell #Fedora43 #Linux #Linuxadmin #Linuxhowto

  28. While sipping my Green Tea 🍵 ...scanning the industry news....and listening to Eric Clapton's numbers 🎶🎧🎸

  29. 🚀 اكتشف GT-GMT – مدير الإقلاع الشامل على GNU/Linux!

    إدارة GRUB وsystemd-boot وrEFInd أصبحت سهلة، آمنة وتفاعلية، مباشرة من الطرفية أو عبر AppImage.

    🔹 تثبيت عن بعد:

    bash <(curl -fsSL https://raw.githubusercontent.com/SalehGNUTUX/GT-GMT/main/install_online.sh)

    🔹 نسخة AppImage مستقلة: تحميل GT-GMT AppImage

    🔹 المستودع على GitHub: زيارة مستودع GT-GMT

    💡 واجهة سهلة، دعم عربي، نسخ احتياطية، واستكشاف الأنظمة المثبتة. جربه الآن وامنح جهازك القوة الكاملة لإدارة الإقلاع! 💻✨

    #مدير_الإقلاع #لينكس #أدوات_لينكس #نظام_تشغيل #GRUB #systemd_boot #rEFInd #برمجيات_حرة #مجتمع_لينكس #تكنولوجيا #برمجيات_مفتوحة #أدوات_نظام #تقنية #مطورين

    #GTGMT #BootManager #Linux #GNU_Linux #GRUB #systemd_boot #rEFInd #OpenSource #AppImage #LinuxTools #LinuxUtilities #LinuxAdmin #SysAdmin #TechTools #Software #FreeSoftware #ArabicTech #LinuxCommunity #LinuxArabic #OpenSourceTools #gnutux