fmstrat

joined 2 years ago
MODERATOR OF
[–] fmstrat@lemmy.nowsci.com 2 points 1 hour ago* (last edited 59 minutes ago)

You always "boot something that is unencrypted." You then "mount" the encrypted volumes and load the OS.

This is how people can put an SSH server (dropbear) in initramfs so they can unlock remotely.

The attack is to initramfs, not the encrypted layer.

The order'ish:

  • Boot
  • Initramfs loads, gives you the LUKS prompt
  • Initramfs decrypts/mounts OS
  • OS loads
[–] fmstrat@lemmy.nowsci.com 1 points 1 hour ago

The other poster mentioned it, but some things that may help:

  • There is a phone-friendly web editor built in for editing Markdown
  • You're able to see the history of changes, and a reason why they were made if one was provided
  • You can link directly to a line or header in the markdown
  • Others can make changes that you can then approve or reject
[–] fmstrat@lemmy.nowsci.com 1 points 5 hours ago* (last edited 5 hours ago) (2 children)

I'm confused.

Initramfs is unencrypted in /boot when using LUKS with RAID. It has to be, right?

The attacker uses a debug shell to modify the unencrypted boot, so the next time you boot and type your LUKS password, they can gain access.

This doesn't line up with your comment?

[–] fmstrat@lemmy.nowsci.com 4 points 6 hours ago (1 children)

Everyone is waiting for this. There needs to be a party.

[–] fmstrat@lemmy.nowsci.com 5 points 6 hours ago

A fun conversation starter is always "So do you have an internal monologue?"

[–] fmstrat@lemmy.nowsci.com 3 points 6 hours ago

No thanks. I get some people agreed to this, but I'm going to continue to use .lan, like so many others. If they ever register .lan for public use, there will be a lot of people pissed off.

IMO, the only reason not to assign a top-level domain in the RFC is so that some company can make money on it. The authors were from Cisco and Nominum, a DNS company purchased by Akamai, but that doesnt appear to be the reason why. .home and .homenet were proposed, but this is from the mailing list:

  1. we cannot be sure that using .home is consistent with the existing (ab)use
  2. ICANN is in receipt of about a dozen applications for ".home", and some of those applicants no doubt have deeper pockets than the IETF does should they decide to litigate

https://mailarchive.ietf.org/arch/msg/homenet/PWl6CANKKAeeMs1kgBP5YPtiCWg/

So, corporate fear.

[–] fmstrat@lemmy.nowsci.com 2 points 7 hours ago

I just use openssl"s built in management. I have scripts that set it up and generate a .lan domain, and instructions for adding it to clients. I could make a repo and writeup if you would like?

As the other commenter pointed out, .lan is not officially sanctioned for local use, but it is not used publicly and is a common choice. However you could use whatever you want.

[–] fmstrat@lemmy.nowsci.com 7 points 15 hours ago (4 children)

I use a domain, but for homelab I eventually switched to my own internal CA.

Instead of having to do service.domain.tld it's nice to do service.lan.

[–] fmstrat@lemmy.nowsci.com 16 points 23 hours ago

Yea no clue what this is. No context, can't reqd what was attached because it's an image. Waste of a post.

[–] fmstrat@lemmy.nowsci.com 4 points 23 hours ago* (last edited 23 hours ago)

Agreed, and unfortunately articles like this are food for CEOs to do more under the guise of AI. "See, it works!"

[–] fmstrat@lemmy.nowsci.com 9 points 23 hours ago (3 children)

Wouldn't it be more efficient to put this on Codeberg and accept PRs?

[–] fmstrat@lemmy.nowsci.com 13 points 23 hours ago (2 children)

I'm still running Qwen32b-coder on a Mac mini. Works great, a little slow, but fine.

44
Bodybuilders can't count. (web.archive.org)
submitted 4 days ago* (last edited 4 days ago) by fmstrat@lemmy.nowsci.com to c/funny@sh.itjust.works
 

My partner ran across this thread randomly when searching for something else. This is the epitome of mid 2k internet arguments between the dumb and the not so dumb. It's 5 pages long, and I bet if you start it, you will finish it.

It revolves around a debate of how long a week is, what working out "every other day" means, and everyone else laughing at them along the way.

 

The author of Holism and Evolution, Jan Smuts, used the Greek word "holos" as the root of "holism" instead of "whole" (the book was English, and "whole" was commonplace). In later years, wholistic was coined, but never caught on. While there could be other reasons for the choice than making it sound more scientific, it sure seems to be the case.

This is one of those examples of the English language that annoys me.

https://www.etymonline.com/word/holistic

https://en.m.wikipedia.org/wiki/Holism

 

So there are tons of 12"x9" magnetic grids out there for dropping screws onto when taking apart electronics, but my projects typically involve integration into other materials.

Having a sewing mat (about 24"x18") with all the metric/imperial grid lines and angle lines, but with a magnetic backing for holding screws in place would be perfect.

Has anyone ever tried to make a DIY magnetic desk pad? And if so, how did it go?

 

I don't think this is how it is supposed to work.

10
submitted 3 weeks ago* (last edited 3 weeks ago) by fmstrat@lemmy.nowsci.com to c/games@lemmy.world
 

Really wish the DLC for this was still available. Slay away Camp is good, but this was so much better and I missed out on the DLC..

 

It's 6:30 hands down.

 

Hi all,

I'm going to try getting Zwift (a game that connects to Bluetooth, WiFi, or ANT+ bike trainers) running in Linux.

I'm pretty sure I can do this with my trainer since mine supports WiFi connectivity, but am curious as to if I could make it work with trainers that only support BT or ANT+.

I've previously done stuff like USB and PCI pass-through with KVM, but is this possible with Steam and Proton?

Thanks.

 

Hi all,

I've been thinking about picking up an N150 or 5825U MiniITX board for a NAS, but I'm wondering if there are better options given my requirements.

  • At least 2x 2.5Gb LAN
  • A 10Gb LAN, or 2.5Gb if not
  • 2x NVME
  • 8x SATA for spinning disks
  • 2x SATA for SSDs
  • MiniITX is required for the 10" rack
  • 64+ Gigs of RAM (ZFS cache) (This is not possible on an N150)

The problem I'm running into with the boards I've looked at is PCIe lanes, and not having ways to expand the sata or network ports without stealing from NVME.

I've started to look at boards with PCIe 4.0x16 slots and risers/splitters for expansion, but then I can't find low power CPUs for them.

Thoughts?

 

Hi everyone,

I've been a single-server built from whatever desktop I upgraded for years kind of guy, with a hostname of the street it is on (better than server, which is what it used to be).

However, at some point in the future my home lab will be located in a place I will not have immediate access to, and since it's getting on in age and due for an upgrade anyway, I'm going to build in some redundancy. So, current names:

  • OPNsense micro-router: ingress01
  • OPNsense backup: ingress02
  • Cluster micro-server with essential services: cluster01
  • Cluster micro-server with non-essential services and replicated essential services: cluster02
  • NAS: nas
  • Powered on remotely when needed:
    • Mac mini dev/release box: macmini
    • Primary remote development server (basically my old desktop): desktop

Bring on the Mini-MacMinifaces, and any other ideas you have.

 

The GitHub repos at https://github.com/organicmaps are all public archives now, but there's no information on them about why.

 

cross-posted from: https://lemmy.nowsci.com/post/13005097

Hi all,

I've been running a bunch of services in docker containers using Docker Compose for a while now, with data storage on ZRAID mirrored NVME and/or ZRAID2 HDDs.

I've been thinking about moving from my single server setup to three micro-servers (Intel N150s), both for redundancy, learning, and fun.

Choosing Kubernetes was easy, but I'd like to get some outside opinions on storage. Some examples of how I'm using storage:

  1. Media and large data storage: Currently on the ZRAID2 HDDs, will stay here but be migrated to a dedicated NAS
  2. High IO workloads like Postgresql and email: Currently running on the NVMEs
  3. General low-volume storage: Also currently on NVMEs, but different use case. These are lower IO, like data storage for Nextcloud, Immich, etc

I'm a huge fan of being able to snapshot with ZFS, as I mirror all my data off-site with hourly pushes for some container data, and daily for the rest. I'd like to be able to continue this kind of block-level backups if possible.

Assume I'm a noob at Kubernetes storage (have been reading, but still fresh to me). I'd love to know how others would set up their storage interfaces for this.

I'm trying to understand if there's a way to have the storage "RAIDed" across the drives in the three micro-servers, or if things work differently than I expect. Thanks!

view more: next ›