veganism.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Veganism Social is a welcoming space on the internet for vegans to connect and engage with the broader decentralized social media community.

Administered by:

Server stats:

297
active users

#oidc

3 posts3 participants0 posts today

Release notes for v25.03.1 of Malcolm, a powerful, easily deployable network traffic analysis tool suite for network security monitoring

This has been a busy month for Malcolm! I pushed hard to get v25.03.0 out earlier this month, as it contained pretty much just the Keycloak integration one of our partners (and major funding sources) was waiting for. Rather than wait until April for the other stuff that would have gone into the regular end-of-the-month release, I decided to pull those items into this smaller release just a week and a half after the last one.

Malcolm v25.03.1 contains a few enhancements, bug fixes, and several component version updates, including one that addresses a CVE that may affect Hedgehog Linux Kiosk mode and Malcolm's API container.

NOTE: If you have not already upgraded to v25.03.0, read the notes for v25.02.0 and v25.03.0 and follow the Read Before Upgrading instructions on those releases.

Changes in this release

  • ✨ Features and enhancements
    • Incorporate new S7comm device identification log, s7comm_known_devices.log (#622)
    • Display current PCAP, Zeek, and Suricata capture results in Hedgehog Linux Kiosk mode (#566)
    • Keycloak authentication: configurable group or role membership restrictions for login (#633) (see Requiring user groups and realm roles)
    • Mark newly-discovered and uninventoried devices in logs during NetBox enrichment (#573)
    • Added "Apply recommended system tweaks automatically without asking for confirmation?" question to install.py to allow the user to accept changes to sysctl.conf, grub kernel parameters, etc., without having to answer "yes" to each one.
  • ✅ Component version updates
  • 🐛 Bug fixes
    • Fix install.py error when answering yes to "Pull Malcolm images?" with podman (#604)
    • Order of user-provided tags from PCAP upload interface not preserved (#624)
  • 📄 Configuration changes (in environment variables in ./config/) for Malcolm and in control_vars.conf for Hedgehog Linux
  • 🧹 Code and project maintenance
    • Ensure Malcolm's NetBox configuration Python scripts are baked into the image in addition to bind-mounting them in docker-compose.yml at runtime.

Malcolm is a powerful, easily deployable network 🖧 traffic analysis tool suite for network security monitoring 🕵🏻‍♀️.

Malcolm operates as a cluster of containers 📦, isolated sandboxes which each serve a dedicated function of the system. This makes Malcolm deployable with frameworks like Docker 🐋, Podman 🦭, and Kubernetes ⎈. Check out the Quick Start guide for examples on how to get up and running.

Alternatively, dedicated official ISO installer images 💿 for Malcolm and Hedgehog Linux 🦔 can be downloaded from Malcolm's releases page on GitHub. Due to limits on individual files in GitHub releases, these ISO files have been split 🪓 into 2GB chunks and can be reassembled with scripts provided for both Bash 🐧 (release_cleaver.sh) and PowerShell 🪟 (release_cleaver.ps1). See Downloading Malcolm - Installer ISOs for instructions.

As always, join us on the Malcolm discussions board 💬 to engage with the community, or pop some corn 🍿 and watch a video 📼.

I'm confused how a static site can do OIDC.

Isn't there supposed to be a client/application ID-secret pair that are used to exchange the auth token for the actual access token that /does/ stuff?

How do you store that secret when it's all static files and client-side JS calls?

For the AlekSIS project, a very active open source school information system, we are looking for a freelance #Python and #Django developer with knowledge about #OAuth and #OIDC.

The task is to implement several features in django-oauth-toolkit.

If you think you might be that person, please ping me and @hansegucker!

For those who attend, #FOSDEM will be a good opportunity to meet if you are interested, but that's by no means a requirement.

@abosio

I could buy this if #TailScale was being promoted on, say, #LinuxUnplugged. On a show specifically about self hosting though, promoting something that runs everyone's logins through #Google/#Microsoft/#Apple is hypocritical.

#OIDC is at least self-hostable, but setting that up wipes out the main claimed benefit, namely that it will be up and running "within minutes". So they're making claims on a show literally called "SelfHosting" that are only met by using #GAFAM accounts.

Back in June I wrote about an exciting confluence of digital auth tech:

(1) The commodification of #OIDC infrastructure, (2) the emergence of #FedCM, (3) and the compatibility of both with #indieauth .

In short, it is now easier than ever to log into web applications using your own website as an identity provider. Or at least, it would be, if your favorite web apps supported these agency-enhancing technologies.

blog.erlend.sh/indie-social-si

Open Indie · Indie social sign-in could go mainstreamBack in June I wrote about an exciting confluence of digital auth tech: ### Social sign-in for indies The focal point of Weird Net...

I've got to say, I'm disappointed with my first look into @tailscale . It was promoted heavily by The #SelfHosted Show on #JupiterBroadcasting as "installs on any device in minutes".

Well, #Tailscale needs an account.

Fine.

The only options though are #Google, #Microsoft, #Github, #Apple or #OIDC. Only one doesn't report to #GAFAM's #surveillance, and that definitely won't be up and running "in minutes".

...and is the server software (not #HeadScale ) #proprietary?

What am I missing here?

Hello World!

I'm now reachable on my own ActivityPub instance (running #gotosocial using #semaphore as a frontend)

Everything seems to be working fine so far. Auth via the #authelia #sso using #oidc is also working really well.

(Yes, I'm testing Hashtags at the moment).

All the configs are public and the commit introducing them is this one:

https://git.emile.space/hefe/commit/?id=b1140ee81828a97a3bdcb098ae88c5ad33c2e93e

The gotosocial instance itself publishes the user-page here: https://social.emile.space/@hanemile

git.emile.spaceworking gotosocial - hefe - Yet another monorepo (the big nix config)