fosstodon.org is one of the many independent Mastodon servers you can use to participate in the fediverse.
Fosstodon is an invite only Mastodon instance that is open to those who are interested in technology; particularly free & open source software. If you wish to join, contact us for an invite.

Administered by:

Server stats:

10K
active users

#auth

0 posts0 participants0 posts today

When you set up authoritative DNS servers for domains, do you try to have NSes in the same TLD zone to take advantage of Glue recors in the zone (e.g.: .net domain would use name servers under .net too), or intentionally use NSes in separate TLD zones (like major cloud vendors do) ignoring Glue records, but using separate TLDs (.com, .info, ccTLD, etc.) for supposed redundancy in case one TLD registry goes offline?

Or you do not care at all? :blobcatnerd:

#poll#fediadmin#dns

The open-source security / authentication stacks are great at the core of what they do.

... I still want to grab some of the devs who maintain them and shake 'em by the lapels for having really bad DevEx opinions.

Burned two hours this week failing to get basic auth working on a Docker registry instance because I wasn't properly binding the htpasswd file I set up. Time would have been cut in half if the log entry was "user not in the password file" instead of a generic "authentication failed." I'm sure someone was like "hurr durr you can't put that much detail in the logs, attackers could steal the logs and have so much info." Look... Fuck you, my (imaginary) guy, no attackers are gonna steal the logs because the service won't exist because I don't have enough debug info to stand it up in the first place.

TIL! macOS supports Touch ID for sudo, but turning it on is a bit obscure

:; grep ^ /etc/pam.d/sudo_local.template
# sudo_local: local config file which survives system update and is included for sudo
# uncomment following line to enable Touch ID for sudo
#auth sufficient pam_tid.so

you need to copy the template to /etc/pam.d/sudo_local (see the include directive in /etc/pam.d/sudo) and uncomment the magic line

API Key Authentication в ASP.NET Core Web Api

Недавно я столкнулся с задачей реализации аутентификации с использованием API Key в ASP.NET Core Web API. Хотя многие авторы рекомендуют использовать IAuthorizationFilter для этой цели, я обнаружил, что это не самый подходящий вариант. У меня есть более удачный подход, которым я хотел бы поделиться, включая примеры. Реализация была протестирована как в .NET 8, так и в .NET 9.

habr.com/ru/articles/877302/

ХабрAPI Key Authentication в ASP.NET Core Web ApiНедавно я столкнулся с задачей реализации аутентификации с использованием API Key в ASP.NET Core Web API. Хотя многие авторы рекомендуют использовать IAuthorizationFilter для этой цели, я обнаружил,...
#net#net_core#net_8