0 Followers
0 Following
4 Posts
Mechatronics engineering grad at University of Waterloo. I've led teams and shipped products— hardware and software. Areas of interest include DevOps and DX, tools, pipelines, and packaging. Experience in Nix and Debian primarily, increasingly GHA, TypeScript, and Docker Buildx Bake. Clearpath Robotics / OTTO Motors alum, now at Simbe Robotics.

All opinions expressed are entirely my own.

https://www.linkedin.com/in/mike-purvis-6166a42/

https://meet.hn/city/ca-Kitchener
This account is a replica from Hacker News. Its author can't see your replies. If you find this service useful, please consider supporting us via our Patreon.

Officialhttps://
Support this servicehttps://www.patreon.com/birddotmakeup

For others whose Linux experience is almost exclusively on the command line, xv is a desktop image viewer, capable of some basic edits:

https://en.wikipedia.org/wiki/Xv_(software)

xv (software) - Wikipedia

It's pretty trivial to just open it up and disconnect the speaker too. I took one apart to make a custom wallet card out of it and broke the speaker in doing so; the rest of it worked perfectly fine (though obviously the warning would still work).

I guess so, yeah, though that sounds like that's a whole separate ecosystem, and positions itself as a direct competitor:

https://goteleport.com/compare/tailscale-alternative/

OTOH, a lot of people who think they need a VPN really just need tunneling and authenticated access, so I can see the pitch for why Teleport's offering is a fit for many users who would otherwise consider tailscale.

So this is a configuration linter; what I was hoping it might be is something that provides live auditd notices for when a tailscale user connects by SSH to a common "admin" account.

The tailscale daemon definitely knows which user it is making the connection, as it publishes that info into the journal and I've seen people scrape it out of there, but I'd much rather it go through a structured reporting pipeline. AFAICT, tailscale itself provides several things that look like they're this, but aren't quite the right thing, for example https://tailscale.com/kb/1203/audit-logging is about logging changes to the tailnet itself (eg adding nodes), and https://tailscale.com/kb/1246/tailscale-ssh-session-recordin... is recording the ssh sessions rather than simple events for XYZ logged in / XYZ session idle / XYZ disconnected.

(And yes, I know people have opinions about common admin accounts, but tailscale is another route into what FB described as far as everyone accessing the same root account but doing so with their own credentials [good!] rather than a shared key [very bad!]: https://engineering.fb.com/2016/09/12/security/scalable-and-...)

Configuration audit logging · Tailscale Docs

Identify who did what, and when, to your tailnet configuration.

Tailscale