Mozilla Operations Security (OpSec) team:
- Cipher suite: Modern compatibility
- General server config: Nginx
| { | |
| "always_show_minimap_viewport": true, | |
| "auto_complete_commit_on_tab": true, | |
| "bold_folder_labels": true, | |
| "caret_extra_bottom": 1, | |
| "caret_extra_top": 1, | |
| "caret_style": "solid", | |
| "color_scheme": "Packages/Color Scheme - Default/Solarized (Dark).tmTheme", | |
| "create_window_at_startup": false, | |
| "ensure_newline_at_eof_on_save": true, |
| { | |
| "color_scheme": "Packages/User/Text Ex Machina bsik.tmTheme", | |
| "translate_tabs_to_spaces": true, | |
| "auto_complete_triggers": [{"selector": "source.python - string - comment - constant.numeric", "characters": "."}], | |
| "complete_parameters": true, | |
| "pep8_ignore": ["E501"] | |
| } |
| import logging; logging.basicConfig(level=logging.DEBUG) |
Mozilla Operations Security (OpSec) team:
| $ terraform plan | |
| Refreshing Terraform state prior to plan... | |
| The Terraform execution plan has been generated and is shown below. | |
| Resources are shown in alphabetical order for quick scanning. Green resources | |
| will be created (or destroyed and then created if an existing resource | |
| exists), yellow resources are being changed in-place, and red resources | |
| will be destroyed. |
| $ terraform plan | |
| Refreshing Terraform state prior to plan... | |
| The Terraform execution plan has been generated and is shown below. | |
| Resources are shown in alphabetical order for quick scanning. Green resources | |
| will be created (or destroyed and then created if an existing resource | |
| exists), yellow resources are being changed in-place, and red resources | |
| will be destroyed. |
I hereby claim:
To claim this, I am signing this object:
| # client TLS parameters | |
| smtp_tls_security_level = secure | |
| smtp_tls_mandatory_protocols = !SSLv2,!SSLv3,!TLSv1,!TLSv1.1 | |
| smtp_tls_mandatory_ciphers = high | |
| smtp_tls_cert_file=/etc/letsencrypt/live/XXX/fullchain.pem | |
| smtp_tls_key_file=/etc/letsencrypt/live/XXX/privkey.pem | |
| smtp_tls_CAfile = /etc/ssl/certs/ca-certificates.crt | |
| smtp_tls_session_cache_database = btree:${data_directory}/smtp_scache | |
| smtp_tls_loglevel = 1 | |
| smtp_tls_note_starttls_offer = yes |
| $jre/bin/keytool \ | |
| -import \ | |
| -trustcacerts \ | |
| -file /path/to/MyIntermediateCA.crt \ | |
| -alias MyIntermediateCA \ | |
| -keystore $jre/lib/security/cacerts \ | |
| -storepass changeit \ | |
| -noprompt |