For anything important, use matrix instead of lemmy DMs.

  • 0 Posts
  • 17 Comments
Joined 2 years ago
cake
Cake day: June 22nd, 2023

help-circle




  • Interesting.
    I’m not doing anything special that wasn’t in one of the popular tutorials and I thought that’s how it was supposed to work, although it might very well be a “bug” how it behaves right now.

    I don’t know enough about this, but the drivers are blacklisted on the host at boot, yet the console is still displayed through the GPU’s HDMI at that time which might depend on the specific GPU (a vega64 in my case).

    The host doesn’t have a graphical desktop environment, just the shell.









  • I hear ya.
    I get 1-6 meetings in the same time slot, people don’t care to check so I don’t care to show.
    I decide which meetings are important for actually moving stuff forward and screw the rest.

    There’s only ever one guy who complained to my boss…
    I didn’t show up for a meeting for a Friday 7pm, invite sent at like 4:58pm the same day for some inane and absolutely not urgent subject.
    I saw that invite come in, chuckled, closed my laptop, went home and ignored it.

    Later that night, the guy went nuts and CC’d everyone’s bosses because he had wasted the full hour and obviously no one showed up to his meeting “even though I made sure to check everyone’s calendar and everyone was available and you’re all unprofessional”.

    I don’t do emails notifications on phones as a rule unless you wanna pay my rate 24/7, but I had forgotten to do my time sheet so I was logged in doing that…

    I dabble in a bit of passive aggressiveness in the face of corporate bullshit, so I finished my timesheet and hit propose new time… Sunday 3:21 am…
    “Checked your calendar and it was available. Sorry for the inconvenience.”
    Closed my laptop and fucked off.

    The guy went nuclear over several emails.
    Sent a quick email to my boss “Just a heads-up, I think I angered someone by not attending their 7pm meeting they sent at 4:58pm and proposing an equally ridiculous time”

    Never heard from the guy again and the next week he wasn’t in the company AD anymore.

    Probably went full tilt cookie monster in the coke jar or something.



  • The problem is there’s likely not a universal solution that’s guaranteed to clean everything in every case.

    Cleaning specific logs/configs is much easier when you know what you’re dealing with.
    Something like anonymizing a Cisco router config is easy enough because it folllows a known format that you can parse and clean.
    Building a tool to anonymize some random logs from a specific software is one thing, anonymizing all logs from any software is unlikely.
    Either way, it should always be double-checked and tailored to what’s being logged.


  • It depends a lot on what the application is logging to begin with.
    If a project prints passwords in logs, consider to just GTFO as it’s terrible security practice.
    There might also be sensitive info that’s not coming from a static thing like your username, but from variable data such as IP addresses, gps coordinates, or whatever thing gets logged.
    Meaning a simple find&replace might be insufficient.

    When possible, I tend to replace the info I remove with a short name of what I replaced out as it’s easier to understand context when it’s not all ********** or truncated.
    example:

    proxy_container_1     | <redacted_client1_ip> - - [17/Aug/2024:12:39:06 +0000] "GET /u/<redacted_local_user2> HTTP/1.1" 200 963 "-" "Lemmy/0.19.4; +<redacted_remote_instance3_fqdn>"
    

    keeping the same placeholders for subsequent substitutions helps because if everything is the same, then you don’t know what’s what anymore.
    (this single line would be easy enough either way, but if you have a bunch and can’t tell client1 from client50 apart anymore that can hinder troubleshooting.

    regular expressions are useful in doing that, but something that works on a specific set of logs might miss sensitive info in another.

    I’m sure people have made tools to help with that, possibly with regex patterns for common stuff, but even with that, you’d need to doublecheck the output to be 100% sure.

    It helps a lot when whatever app doesn’t log too much sensitive info to begin with, but that’s usually out of your hands as a user.