This tag identifies security issue.
Details
Details
Description
Yesterday
Yesterday
With Salt, sudo files content are now managed from rOPS.
Sun, Mar 22
Sun, Mar 22
dereckson triaged T2107: j'aimerais avoir une présence permanente sur internet as Wishlist priority.
dereckson added a comment to T1861: Configure static IPv6 on WindRiver.
Next: configure DNS records
dereckson changed the visibility for T2143: Hash Tomcat credentials.
dereckson shifted T2143: Hash Tomcat credentials from the Restricted Space space to the S1 Nasqueron space.
dereckson moved T1109: Switch all OAuth GitHub applications to Nasqueron organization accounts from Backlog to Infra on the Auth Grove board.
dereckson triaged T1109: Switch all OAuth GitHub applications to Nasqueron organization accounts as Normal priority.
dereckson placed T1513: Propagate certificate to Openfire server up for grabs.
Sat, Mar 21
Sat, Mar 21
dereckson added a parent task for T1513: Propagate certificate to Openfire server: T2043: Switch to acme.sh instead of certbot.
dereckson updated subscribers of T1513: Propagate certificate to Openfire server.
Will need to be revisited when we switch to acme.sh.
Fri, Mar 20
Fri, Mar 20
dereckson updated the title for P390 Anubis default botPolicies.yaml from botPolicies.yaml to Anubis default botPolicies.yaml.
Feb 5 2026
Feb 5 2026
dereckson closed T2210: fullchain.pem isn't automatically generated by acme.sh as Resolved by committing rOPSc9cb237e5e18: Automate acme.sh install-cert cmd.
Patched it live.
dereckson updated subscribers of T2210: fullchain.pem isn't automatically generated by acme.sh.
Feb 3 2026
Feb 3 2026
dereckson added a revision to T2198: Create new account for duranzed for Samy: D3899: Add duranzed to shell users.
dereckson renamed T2198: Create new account for duranzed for Samy from SSH pubkey to add to Create new account for duranzed for Samy.
Nov 10 2025
Nov 10 2025
dereckson added a comment to T2183: Detect legacy SHA-1 RSA keys.
Bruteforce attack scenario possible, so we're only interested by usernames defined in users.sls, not by "root" (can't login by SSH) or generic accounts like "docker" (doesn't exist):
dereckson updated the task description for T2183: Detect legacy SHA-1 RSA keys.
dereckson updated the task description for T2183: Detect legacy SHA-1 RSA keys.
dereckson updated the task description for T2183: Detect legacy SHA-1 RSA keys.
Oct 25 2025
Oct 25 2025
dereckson moved T1145: Don't truncate passwords from Backlog to General bug & features on the C board.
Oct 24 2025
Oct 24 2025
dereckson added a comment to T2155: Review rotation for acme.sh logs.
Same issue for rhyne-wyse.log. Configuration was copied from acme.sh one.
Oct 20 2025
Oct 20 2025
dereckson added a parent task for T2155: Review rotation for acme.sh logs: T2043: Switch to acme.sh instead of certbot.
Oct 13 2025
Oct 13 2025
dereckson moved T2143: Hash Tomcat credentials from Backlog to Pending review on the Nasqueron Docker deployment squad board.
dereckson moved T2143: Hash Tomcat credentials from Backlog to Pending review on the security board.
dereckson added a comment to T2143: Hash Tomcat credentials.
Credentials have been hashed directly in Vault, so we don't need to manipulate cleartext password with Salt.
Salt updated the tomcat-users.xml accordingly.
dereckson added a revision to T2143: Hash Tomcat credentials: D3755: Configure Tomcat server explicitly.
Oct 11 2025
Oct 11 2025
dereckson moved T1656: Convert daeghrefn. for Uspection use from Backlog to Need dev on the documentation board.
dereckson moved T1657: Convert docs. for Uspection use from Backlog to Need dev on the documentation board.
The full /etc/nginx directories on both docker-002 and dwellers use httpd_config_t for every file.
dereckson updated the task description for T1765: SELinux context is missing for /etc/nginx configuration files.
Oct 10 2025
Oct 10 2025
dereckson updated the task description for T2132: Propagate acme.sh certificate so Dovecot can read it.
dereckson moved T2132: Propagate acme.sh certificate so Dovecot can read it from Backlog to Pending review on the security board.
