Browse Source

Move two more posts to bundles

master
Chris Smith 4 years ago
parent
commit
21e3b30ec9
Signed by: Chris Smith <chris@chameth.com> GPG Key ID: 3A2D4BBDC4A3C9A9

+ 11
- 7
nginx.conf View File

51
     }
51
     }
52
 
52
 
53
     map $request_uri $redirect_uri {
53
     map $request_uri $redirect_uri {
54
-        /res/images/sense/sense.jpg             /2016/04/10/sense-api/sense.jpg;
55
-        /res/images/wemo/switch.jpg             /2016/05/02/monitoring-power-with-wemo/switch.jpg;
56
-        /res/images/wemo/desk-1d.png            /2016/05/02/monitoring-power-with-wemo/desk-1d.png;
57
-        /res/images/wemo/desk-1w.png            /2016/05/02/monitoring-power-with-wemo/desk-1w.png;
58
-        /res/images/docker/logo.png             /2016/05/21/docker-automatic-nginx-proxy/logo.png;
59
-        /res/images/docker/reverse-proxy.png    /2016/05/21/docker-automatic-nginx-proxy/reverse-proxy.png;
60
-        /res/images/https/https-everywhere.jpg  /2016/06/17/why-you-should-be-using-https/https-everywhere.jpg;
54
+        /res/images/sense/sense.jpg                     /2016/04/10/sense-api/sense.jpg;
55
+        /res/images/wemo/switch.jpg                     /2016/05/02/monitoring-power-with-wemo/switch.jpg;
56
+        /res/images/wemo/desk-1d.png                    /2016/05/02/monitoring-power-with-wemo/desk-1d.png;
57
+        /res/images/wemo/desk-1w.png                    /2016/05/02/monitoring-power-with-wemo/desk-1w.png;
58
+        /res/images/docker/logo.png                     /2016/05/21/docker-automatic-nginx-proxy/logo.png;
59
+        /res/images/docker/reverse-proxy.png            /2016/05/21/docker-automatic-nginx-proxy/reverse-proxy.png;
60
+        /res/images/https/https-everywhere.jpg          /2016/06/17/why-you-should-be-using-https/https-everywhere.jpg;
61
+        /res/images/yubikey/keys.png                    /2016/08/11/offline-gnupg-master-yubikey-subkeys/keys.png;
62
+        /res/images/yubikey/wisdom_of_the_ancients.png  /2016/08/11/offline-gnupg-master-yubikey-subkeys/wisdom_of_the_ancients.png;
63
+        /res/images/ssh/openssh.png                     /2016/10/18/shoring-up-sshd/openssh.png;
64
+        /res/images/ssh/ssh-audit-github.png            /2016/10/18/shoring-up-sshd/ssh-audit-github.png;
61
     }
65
     }
62
 
66
 
63
     server {
67
     server {

+ 1
- 1
site/assets/style/modules/_articles.sass View File

22
   img + p
22
   img + p
23
     margin-top: 1.5em
23
     margin-top: 1.5em
24
 
24
 
25
-  p a
25
+  p a, figcaption a
26
     color: $link-color
26
     color: $link-color
27
     text-decoration-color: $link-underline-color
27
     text-decoration-color: $link-underline-color
28
     text-decoration-skip-ink: auto
28
     text-decoration-skip-ink: auto

site/content/post/2016-08-11-offline-gnupg-master-yubikey-subkeys.md → site/content/post/2016-08-11-offline-gnupg-master-yubikey-subkeys/index.md View File

1
 ---
1
 ---
2
 date: 2016-08-11
2
 date: 2016-08-11
3
-strapline: With bonus completely over-the-top security
4
-thumbnail: /res/images/yubikey/keys.thumb.png
5
 title: Creating an offline GnuPG master key with Yubikey-stored subkeys
3
 title: Creating an offline GnuPG master key with Yubikey-stored subkeys
6
-url: /2016/08/11/offline-gnupg-master-yubikey-subkeys/
7
-image: /res/images/yubikey/keys.png
8
 description: How to use an aircapped computer, a large dose of paranoia, an ironkey, and some yubikeys to create a new GPG key and subkeys.
4
 description: How to use an aircapped computer, a large dose of paranoia, an ironkey, and some yubikeys to create a new GPG key and subkeys.
9
 area: security
5
 area: security
6
+url: /2016/08/11/offline-gnupg-master-yubikey-subkeys/
7
+
8
+resources:
9
+  - src: keys.png
10
+    name: A pair of Yubikeys
11
+    params:
12
+      default: true
13
+  - src: wisdom_of_the_ancients.png
14
+    name: "XKCD: Wisdom of the Ancients"
10
 ---
15
 ---
11
 
16
 
12
-<figure class="right">
13
-  <img src="/res/images/yubikey/keys.png" alt="Two yubikeys">
14
-  <figcaption>A (key-)pair of Yubikeys. (Sorry.)</figcaption>
15
-</figure>
17
+{{< figure "right" "A pair of Yubikeys" >}}
16
 
18
 
17
 I recently noticed that I'd accidentally lost my previous GPG private key &mdash; whoops. It was on
19
 I recently noticed that I'd accidentally lost my previous GPG private key &mdash; whoops. It was on
18
 a drive that I'd since formatted and used for a fair amount of time, so there's no hope of
20
 a drive that I'd since formatted and used for a fair amount of time, so there's no hope of
104
 was able to sign and encrypt e-mail in Thunderbird.
106
 was able to sign and encrypt e-mail in Thunderbird.
105
 
107
 
106
 <figure class="left">
108
 <figure class="left">
107
-  <img src="/res/images/yubikey/wisdom_of_the_ancients.png" alt="XKCD: Wisdom of the ancients">
109
+  {{< img "XKCD: Wisdom of the Ancients" >}}
108
   <figcaption><a href="https://xkcd.com/979/">XKCD #979: Wisdom of the ancients</a></figcaption>
110
   <figcaption><a href="https://xkcd.com/979/">XKCD #979: Wisdom of the ancients</a></figcaption>
109
 </figure>
111
 </figure>
110
 
112
 

site/static/res/images/yubikey/keys.png → site/content/post/2016-08-11-offline-gnupg-master-yubikey-subkeys/keys.png View File


site/static/res/images/yubikey/wisdom_of_the_ancients.png → site/content/post/2016-08-11-offline-gnupg-master-yubikey-subkeys/wisdom_of_the_ancients.png View File


site/content/post/2016-10-18-shoring-up-sshd.md → site/content/post/2016-10-18-shoring-up-sshd/index.md View File

1
 ---
1
 ---
2
 date: 2016-10-18
2
 date: 2016-10-18
3
-thumbnail: /res/images/ssh/openssh.thumb.png
4
 title: Shoring up SSHd configuration
3
 title: Shoring up SSHd configuration
5
-strapline: Down with weak algorithms!
6
-url: /2016/10/18/shoring-up-sshd/
7
-image: /res/images/ssh/openssh.png
8
 description: Tools and suggestions for improving the security of SSHd by disabling weak algorithms and modern config tweaks.
4
 description: Tools and suggestions for improving the security of SSHd by disabling weak algorithms and modern config tweaks.
9
 area: security
5
 area: security
6
+url: /2016/10/18/shoring-up-sshd/
7
+
8
+resources:
9
+  - src: openssh.png
10
+    name: The OpenSSH project logo
11
+    params:
12
+      default: true
13
+  - src: ssh-audit-github.png
14
+    name: Output of ssh-audit pointing at GitHub's SSH servers
10
 ---
15
 ---
11
 
16
 
12
-<figure class="left">
13
-  <img src="/res/images/ssh/openssh.png" alt="OpenSSH logo">
14
-  <figcaption>The OpenSSH project logo</figcaption>
15
-</figure>
17
+{{< figure "left" "The OpenSSH project logo" >}}
16
 
18
 
17
 I recently came across a useful tool on GitHub called
19
 I recently came across a useful tool on GitHub called
18
 [ssh-audit](https://github.com/arthepsy/ssh-audit). It's a small Python script
20
 [ssh-audit](https://github.com/arthepsy/ssh-audit). It's a small Python script
27
 example, I'm looking at GitHub's SSH server and have filtered the output to
29
 example, I'm looking at GitHub's SSH server and have filtered the output to
28
 just warnings and failures:
30
 just warnings and failures:
29
 
31
 
30
-<img src="/res/images/ssh/ssh-audit-github.png" alt="ssh-audit output">
32
+{{< img "Output of ssh-audit pointing at GitHub's SSH servers" >}}
31
 
33
 
32
 GitHub's a bit of a special case, as they're trying to cope with scores of
34
 GitHub's a bit of a special case, as they're trying to cope with scores of
33
 developers pushing code: they can't disable weaker algorithms without also
35
 developers pushing code: they can't disable weaker algorithms without also
93
 using remotely modern clients to connect. Similarly the host-key DSA algorithm
95
 using remotely modern clients to connect. Similarly the host-key DSA algorithm
94
 uses a 1024 bit key, so should be disabled.
96
 uses a 1024 bit key, so should be disabled.
95
 
97
 
96
-Many of the supported encryption algorithms use basically-broken algorithms
97
-(`3des-cbc`, `arcfour`, for example). Some of the remaining are block ciphers
98
+Many of the rejected encryption algorithms use basically-broken algorithms
99
+(`3des-cbc` and `arcfour` for example). Some of the remaining are block ciphers
98
 with small block sizes, which makes them weak (e.g. `blockfish-cbc` uses a
100
 with small block sizes, which makes them weak (e.g. `blockfish-cbc` uses a
99
 block size of 64 bits).
101
 block size of 64 bits).
100
 
102
 

site/static/res/images/ssh/openssh.png → site/content/post/2016-10-18-shoring-up-sshd/openssh.png View File


site/static/res/images/ssh/ssh-audit-github.png → site/content/post/2016-10-18-shoring-up-sshd/ssh-audit-github.png View File


BIN
site/static/res/images/ssh/openssh.thumb.png View File


BIN
site/static/res/images/yubikey/keys.thumb.png View File


Loading…
Cancel
Save