SSH public key authentication could bypass your security (PAM) policy

Some books

Photo credit: Kimberly Farmer (Unsplash license)

Even after using Linux for years, you would always learn something new everyday. In this short article, I would talk about how SSH public key authentication could bypass security policy.

Let's start with pluggable authentication module (PAM). By using Linux PAM, the system could use modules to enhance the security of a system. For example, PAM could setup security policy that a password has to meet certain length and complexity. Another use case of the PAM …

Read more ...

Brief overview of major Kubernetes distributions and cloud providers (1st Edition 2020)

A ship sailing in sunset

Photo credit: Katherine McCormack (Unsplash license)

I really feel Kubernetes is everywhere. It took over the place of OpenStack, Apache Mesos and Cloud Foundry. All major cloud providers are providing containers services, utilizing Kubernetes. Major Linux vendors are having container products based on Kubernetes. SUSE does not have Kubernetes offering but they acquired Rancher recently. VMware had acquired Pivotal and integrated Pivotal Kubernetes Service (PKS) with vSphere platform. HPE joins the competition with their HPE Ezmeral software portfolio.

This article describes and …

Read more ...

Quick take about open source software license models and recent movement

Two computer screens used for coding

Photo credit: Fotis Fotopoulos (Unsplash license)

Introduction

Open source software is everywhere. Linux, Git, LibreOffice and many others. Many companies adopted the open source software with their business model. But it did not work out very well for some companies. In this article, we would take a brief look on open source software and its recent movement.

I am not a lawyer and this article is not legal advice of any kind. Always check with lawyers if you have questions or legal …

Read more ...