aboutsummaryrefslogtreecommitdiff
path: root/TODOs.org
diff options
context:
space:
mode:
Diffstat (limited to 'TODOs.org')
-rw-r--r--TODOs.org26
1 files changed, 23 insertions, 3 deletions
diff --git a/TODOs.org b/TODOs.org
index 53eae48..0504aef 100644
--- a/TODOs.org
+++ b/TODOs.org
@@ -1,6 +1,15 @@
* Tasks - v4
-** TODO cgit: show README in about section
-** TODO Update matterbridge version
+** TODO "Migration": use =euandreh_nextcloud_= prefix to database table
+** DONE cgit: show README in about section
+CLOSED: [2020-09-06 dim. 08:59]
+- State "DONE" from [2020-09-06 dim. 08:59]
+** CANCELLED Update matterbridge version
+CLOSED: [2020-09-06 dim. 08:59]
+- State "CANCELLED" from [2020-09-06 dim. 08:59] \\
+I found matterbridge to be too simplistic for what it was proposing to do. The
+puppeting bridges from Matrix are a much more robust solution, and I'll try that
+instead later.
+
https://github.com/42wim/matterbridge/issues/1061
** DONE Add Prosody DNS record to allow me to use eu@euandreh.xyz as an XMPP address
CLOSED: [2020-08-23 dim. 18:40]
@@ -17,7 +26,9 @@ Or even better: switch to SQLite.
*** TODO [#A] [[https://docs.nextcloud.com/server/stable/admin_manual/installation/harden_server.html][Nextcloud: Hardening and security guidance]]
*** TODO [#A] [[https://ownyourbits.com/2017/03/25/nextcloud-a-security-analysis/][NextCloud, a security analysis]]
*** TODO [#B] [[https://github.com/OWASP/CheatSheetSeries/blob/master/cheatsheets/HTTP_Strict_Transport_Security_Cheat_Sheet.md][Check for HSTS header configuration]]
-*** TODO Move secrets outside the Nix store
+*** DONE Move secrets outside the Nix store
+CLOSED: [2020-09-06 dim. 11:35]
+- State "DONE" from [2020-09-06 dim. 11:35]
*** TODO Properly configure PostgreSQL
*** TODO Separate lighttpd user ownership from =$GIT_ROOT=?
** TODO Add volume
@@ -113,6 +124,15 @@ Instead, explicitly call =ansible-playbook= after =terraform apply= finished run
This way we test the DNS A record -> Floating IP -> Droplet IP path. We can't do that inside Terraform declaration because the =local-exec= provisioning command runs before the =digitalocean_floating_ip_assignment= is created, and we can't create a cyclic dependency between the two resources.
We could use the raw Droplet IP instead of the DNS A record, but I prefer calling it later in order to always test the full DNS resolution.
+** On public SSH key leakage
+As described in "[[https://rushter.com/blog/public-ssh-keys/][Public SSH keys can leak your private infrastructure]]", public
+SSH keys can expose undesired infrastructure, specially for targeted attacks.
+
+I'm not considering this a threat, since the link between the server and me is
+already public. It may be much more effective to just change the SSH port away
+from the default: it doesn't accomplish the same thing, but it prevents simple
+detections. It is still possible to find this out via a script, but is orders of
+magnitute harder for the attacker.
* Questions
** How to best handle IP changes when the server changes? How does this affect the email sending IP reputation?
** Enable 2FA for Nextcloud?