UNIX, Security, and Privacy
IPv6 Privacy Extensionshttps://cryptomonkeys.com/2013/02/privacy-extensions/ 2013-02-10
Many operating systems use the EUI-64 algorithm to generate IPv6 addresses. This algorithm derives the last 64 bits of the IPv6 address using the MAC address. Many see this as a privacy problem. The last half of your IP address will never change, and with MAC addresses being somewhat unique, the interface ID becomes close to a unique “cookie” identifying your system.
SSH keys on network deviceshttps://cryptomonkeys.com/2012/01/ssh-keys-on-network-devices/ 2012-01-22
I got an oppertunity to upgrade my Cisco 2960G switch to something supporting SSH keys (12.2(58)SE2). I wanted to know how the process compares with my Juniper EX switches.
Interview Questionshttps://cryptomonkeys.com/2006/09/interview/ 2006-09-05
Being something of a professional nerd, my idea of storage doesn’t always line up with consumer thinking. I’ve been building my own systems for quite a while, so the idea of building my own NAS was going to happen sooner or later.
Bits of information related to the best server operating system I’ve found.
My Appshttps://cryptomonkeys.com/2006/01/apps-i-find-useful/ 2006-01-23
This is a list of some Apps (and links if they aren’t in the Apple App Store) I find useful (many are available through homebrew’s cask system).