This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
for a in $( seq 1 20 ); do for i in $( ls ); do tree; done; done | |
sudo tcpdump -qlp -i en0 | grep --color=auto -e '.*>' | |
brew install wireshark; sudo tshark --color | |
cat /dev/urandom | |
## Set a profile with courier new for the font, and 00ff27 for the foreground color before starting this BS |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
openssl pkcs7 -inform DER -print_certs -in azwus-prd-hashi-vault001_prod_azwus_nathantech_com.p7b -out azwus-prd-hashi-vault001_prod_azwus_nathantech_com_stacked.cer |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/env bash | |
## Install the latest Vault on a Mac. | |
## Run this as follows: | |
## bash <(curl -s https://gist.githubusercontent.com/v6/d7c1f40a25b5a12a469d76f7efb7733e/raw/59f0f5e4cc3bba4d01ce2c4099f8df0cee72d187/latestvaultosx.sh) | |
release="$(curl -s https://releases.hashicorp.com/vault/index.json|jq -r '.versions[].version'|grep -v 'beta\|rc' | grep '0.1' | tail -n 1)" | |
download="https://releases.hashicorp.com/vault/${release}/vault_${release}_darwin_amd64.zip" | |
echo "Vault Release: ${release}" | |
echo "Vault Download: ${download}" |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
super-duper-vault-train $ls | |
LICENSE initpayload.json | |
PRODUCTION_INSTALLATION.md instance7_consul_http_token.txt | |
README.md instance7_vault_consul_http_token.txt | |
Vagrantfile myunseal.sh | |
Vagrantfile.new playbooks | |
account.sh prereqs.sh | |
configureconsul.sh provision_consul | |
configurevault.sh provision_vault | |
consuldownload.sh vaultdownload.sh |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# -*- mode: ruby -*- | |
# vi: set ft=ruby : | |
echo "THIS WILL MAKE A VM WITH 1 CONSUL RUNNING IN SERVER MODE, AND ANOTHER RUNNING IN CLIENT MODE" | |
$script = <<SCRIPT | |
echo "Installing dependencies on the new VM created by Vagrant ..." | |
sudo apt-get update | |
sudo apt-get install -y unzip curl jq dnsutils |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
How would Vault's encryption handle attacks from quantum computers? | |
I've been researching HashiCorp Vault lately, and I really like that it uses strong cryptography for it's core security mechanisms. | |
https://www.vaultproject.io/docs/internals/security.html#external-threat-overview | |
I want to learn more about this, because it's interesting to discuss. | |
And it may end up affecting many security systems that rely on conventional mechanisms of cryptography in the future, as the technology advances and state actors begin to adopt it. |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
import "time" | |
# Expect requests to only happen during work days (Monday through Friday) | |
# 0 for Sunday and 6 for Saturday | |
workdays = rule { | |
time.now.weekday > 0 and time.now.weekday < 6 | |
} | |
# Expect requests to only happen during work hours (7:00 am - 6:00 pm) | |
workhours = rule { |
OlderNewer