Browse Source

Move two more posts to bundles

master
Chris Smith 4 years ago
parent
commit
21e3b30ec9
Signed by: Chris Smith <chris@chameth.com> GPG Key ID: 3A2D4BBDC4A3C9A9

+ 11
- 7
nginx.conf View File

@@ -51,13 +51,17 @@ http {
51 51
     }
52 52
 
53 53
     map $request_uri $redirect_uri {
54
-        /res/images/sense/sense.jpg             /2016/04/10/sense-api/sense.jpg;
55
-        /res/images/wemo/switch.jpg             /2016/05/02/monitoring-power-with-wemo/switch.jpg;
56
-        /res/images/wemo/desk-1d.png            /2016/05/02/monitoring-power-with-wemo/desk-1d.png;
57
-        /res/images/wemo/desk-1w.png            /2016/05/02/monitoring-power-with-wemo/desk-1w.png;
58
-        /res/images/docker/logo.png             /2016/05/21/docker-automatic-nginx-proxy/logo.png;
59
-        /res/images/docker/reverse-proxy.png    /2016/05/21/docker-automatic-nginx-proxy/reverse-proxy.png;
60
-        /res/images/https/https-everywhere.jpg  /2016/06/17/why-you-should-be-using-https/https-everywhere.jpg;
54
+        /res/images/sense/sense.jpg                     /2016/04/10/sense-api/sense.jpg;
55
+        /res/images/wemo/switch.jpg                     /2016/05/02/monitoring-power-with-wemo/switch.jpg;
56
+        /res/images/wemo/desk-1d.png                    /2016/05/02/monitoring-power-with-wemo/desk-1d.png;
57
+        /res/images/wemo/desk-1w.png                    /2016/05/02/monitoring-power-with-wemo/desk-1w.png;
58
+        /res/images/docker/logo.png                     /2016/05/21/docker-automatic-nginx-proxy/logo.png;
59
+        /res/images/docker/reverse-proxy.png            /2016/05/21/docker-automatic-nginx-proxy/reverse-proxy.png;
60
+        /res/images/https/https-everywhere.jpg          /2016/06/17/why-you-should-be-using-https/https-everywhere.jpg;
61
+        /res/images/yubikey/keys.png                    /2016/08/11/offline-gnupg-master-yubikey-subkeys/keys.png;
62
+        /res/images/yubikey/wisdom_of_the_ancients.png  /2016/08/11/offline-gnupg-master-yubikey-subkeys/wisdom_of_the_ancients.png;
63
+        /res/images/ssh/openssh.png                     /2016/10/18/shoring-up-sshd/openssh.png;
64
+        /res/images/ssh/ssh-audit-github.png            /2016/10/18/shoring-up-sshd/ssh-audit-github.png;
61 65
     }
62 66
 
63 67
     server {

+ 1
- 1
site/assets/style/modules/_articles.sass View File

@@ -22,7 +22,7 @@ article
22 22
   img + p
23 23
     margin-top: 1.5em
24 24
 
25
-  p a
25
+  p a, figcaption a
26 26
     color: $link-color
27 27
     text-decoration-color: $link-underline-color
28 28
     text-decoration-skip-ink: auto

site/content/post/2016-08-11-offline-gnupg-master-yubikey-subkeys.md → site/content/post/2016-08-11-offline-gnupg-master-yubikey-subkeys/index.md View File

@@ -1,18 +1,20 @@
1 1
 ---
2 2
 date: 2016-08-11
3
-strapline: With bonus completely over-the-top security
4
-thumbnail: /res/images/yubikey/keys.thumb.png
5 3
 title: Creating an offline GnuPG master key with Yubikey-stored subkeys
6
-url: /2016/08/11/offline-gnupg-master-yubikey-subkeys/
7
-image: /res/images/yubikey/keys.png
8 4
 description: How to use an aircapped computer, a large dose of paranoia, an ironkey, and some yubikeys to create a new GPG key and subkeys.
9 5
 area: security
6
+url: /2016/08/11/offline-gnupg-master-yubikey-subkeys/
7
+
8
+resources:
9
+  - src: keys.png
10
+    name: A pair of Yubikeys
11
+    params:
12
+      default: true
13
+  - src: wisdom_of_the_ancients.png
14
+    name: "XKCD: Wisdom of the Ancients"
10 15
 ---
11 16
 
12
-<figure class="right">
13
-  <img src="/res/images/yubikey/keys.png" alt="Two yubikeys">
14
-  <figcaption>A (key-)pair of Yubikeys. (Sorry.)</figcaption>
15
-</figure>
17
+{{< figure "right" "A pair of Yubikeys" >}}
16 18
 
17 19
 I recently noticed that I'd accidentally lost my previous GPG private key &mdash; whoops. It was on
18 20
 a drive that I'd since formatted and used for a fair amount of time, so there's no hope of
@@ -104,7 +106,7 @@ of the subkeys on the Yubikey. After that [Enigmail](https://www.enigmail.net/in
104 106
 was able to sign and encrypt e-mail in Thunderbird.
105 107
 
106 108
 <figure class="left">
107
-  <img src="/res/images/yubikey/wisdom_of_the_ancients.png" alt="XKCD: Wisdom of the ancients">
109
+  {{< img "XKCD: Wisdom of the Ancients" >}}
108 110
   <figcaption><a href="https://xkcd.com/979/">XKCD #979: Wisdom of the ancients</a></figcaption>
109 111
 </figure>
110 112
 

site/static/res/images/yubikey/keys.png → site/content/post/2016-08-11-offline-gnupg-master-yubikey-subkeys/keys.png View File


site/static/res/images/yubikey/wisdom_of_the_ancients.png → site/content/post/2016-08-11-offline-gnupg-master-yubikey-subkeys/wisdom_of_the_ancients.png View File


site/content/post/2016-10-18-shoring-up-sshd.md → site/content/post/2016-10-18-shoring-up-sshd/index.md View File

@@ -1,18 +1,20 @@
1 1
 ---
2 2
 date: 2016-10-18
3
-thumbnail: /res/images/ssh/openssh.thumb.png
4 3
 title: Shoring up SSHd configuration
5
-strapline: Down with weak algorithms!
6
-url: /2016/10/18/shoring-up-sshd/
7
-image: /res/images/ssh/openssh.png
8 4
 description: Tools and suggestions for improving the security of SSHd by disabling weak algorithms and modern config tweaks.
9 5
 area: security
6
+url: /2016/10/18/shoring-up-sshd/
7
+
8
+resources:
9
+  - src: openssh.png
10
+    name: The OpenSSH project logo
11
+    params:
12
+      default: true
13
+  - src: ssh-audit-github.png
14
+    name: Output of ssh-audit pointing at GitHub's SSH servers
10 15
 ---
11 16
 
12
-<figure class="left">
13
-  <img src="/res/images/ssh/openssh.png" alt="OpenSSH logo">
14
-  <figcaption>The OpenSSH project logo</figcaption>
15
-</figure>
17
+{{< figure "left" "The OpenSSH project logo" >}}
16 18
 
17 19
 I recently came across a useful tool on GitHub called
18 20
 [ssh-audit](https://github.com/arthepsy/ssh-audit). It's a small Python script
@@ -27,7 +29,7 @@ This is the kind of output you get when running ssh-audit. In this particular
27 29
 example, I'm looking at GitHub's SSH server and have filtered the output to
28 30
 just warnings and failures:
29 31
 
30
-<img src="/res/images/ssh/ssh-audit-github.png" alt="ssh-audit output">
32
+{{< img "Output of ssh-audit pointing at GitHub's SSH servers" >}}
31 33
 
32 34
 GitHub's a bit of a special case, as they're trying to cope with scores of
33 35
 developers pushing code: they can't disable weaker algorithms without also
@@ -93,8 +95,8 @@ as a warning, but there's no compelling reason to keep it around if you're
93 95
 using remotely modern clients to connect. Similarly the host-key DSA algorithm
94 96
 uses a 1024 bit key, so should be disabled.
95 97
 
96
-Many of the supported encryption algorithms use basically-broken algorithms
97
-(`3des-cbc`, `arcfour`, for example). Some of the remaining are block ciphers
98
+Many of the rejected encryption algorithms use basically-broken algorithms
99
+(`3des-cbc` and `arcfour` for example). Some of the remaining are block ciphers
98 100
 with small block sizes, which makes them weak (e.g. `blockfish-cbc` uses a
99 101
 block size of 64 bits).
100 102
 

site/static/res/images/ssh/openssh.png → site/content/post/2016-10-18-shoring-up-sshd/openssh.png View File


site/static/res/images/ssh/ssh-audit-github.png → site/content/post/2016-10-18-shoring-up-sshd/ssh-audit-github.png View File


BIN
site/static/res/images/ssh/openssh.thumb.png View File


BIN
site/static/res/images/yubikey/keys.thumb.png View File


Loading…
Cancel
Save