<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Security on Technical Notes</title><link>http://luispa.com/en/tags/security/</link><description>Recent content in Security on Technical Notes</description><generator>Hugo -- 0.148.0</generator><language>en-US</language><lastBuildDate>Sun, 02 Mar 2025 00:00:00 +0000</lastBuildDate><atom:link href="http://luispa.com/en/tags/security/index.xml" rel="self" type="application/rss+xml"/><item><title>Self-Hosted Bitwarden</title><link>http://luispa.com/en/posts/2025-03-02-bitwarden/</link><pubDate>Sun, 02 Mar 2025 00:00:00 +0000</pubDate><guid>http://luispa.com/en/posts/2025-03-02-bitwarden/</guid><description>&lt;img src="http://luispa.com/img/posts/logo-bitvaultwarden.svg" alt="Bit and Vault warden Logo" width="150px" style="float:left; padding-right:25px" />
&lt;p>In this post I describe the process of installing a &amp;ldquo;Bitwarden&amp;rdquo; server. I&amp;rsquo;ve been using their Cloud service for several years, but I&amp;rsquo;ve decided to go with an on-premise home installation.&lt;/p>
&lt;p>While researching I discover with surprise that I have two options, the first is to use the official &lt;strong>Bitwarden self-hosted&lt;/strong> (which consumes quite a few resources and seems complex) or go with a lightweight &lt;strong>Vaultwarden&lt;/strong>, a clone of the former, which apparently installs quickly and is simple.&lt;/p>
&lt;br clear="left"/></description></item><item><title>OpenVPN Server</title><link>http://luispa.com/en/posts/2014-09-14-vpn-server-en-linux/</link><pubDate>Sun, 14 Sep 2014 00:00:00 +0000</pubDate><guid>http://luispa.com/en/posts/2014-09-14-vpn-server-en-linux/</guid><description>&lt;img src="http://luispa.com/img/posts/logo-openvpn.svg" alt="OpenVPN logo" width="150px" height="150px" style="float:left; padding-right:25px" />
&lt;p>In this technical post I&amp;rsquo;ll describe how to set up a home VPN Server based on &lt;a href="https://openvpn.net/">OpenVPN&lt;/a>, which remains the best solution today despite being more complex to implement. The goal is to have access to the internal services of my home network from the internet.&lt;/p>
&lt;br clear="left"/></description></item><item><title>IPtables with nflog</title><link>http://luispa.com/en/posts/2014-08-31-log-iptables/</link><pubDate>Sun, 31 Aug 2014 00:00:00 +0000</pubDate><guid>http://luispa.com/en/posts/2014-08-31-log-iptables/</guid><description>&lt;img src="http://luispa.com/img/posts/2014-08-31-log-iptables-01.jpg" alt="log logo" width="150px" style="float:left; padding-right:25px" />
&lt;p>Geek quote: &amp;ldquo;Logging what happens is wise&amp;hellip;&amp;rdquo; In the past I used &lt;code>ULOG&lt;/code> to analyze which packets were being dropped by &lt;code>iptables&lt;/code>, but since it&amp;rsquo;s been marked as deprecated I&amp;rsquo;ve switched to &lt;code>NFLOG&lt;/code>.&lt;/p>
&lt;br clear="left"/></description></item><item><title>SSH on Linux</title><link>http://luispa.com/en/posts/2009-02-01-ssh/</link><pubDate>Sun, 01 Feb 2009 00:00:00 +0000</pubDate><guid>http://luispa.com/en/posts/2009-02-01-ssh/</guid><description>&lt;img src="http://luispa.com/img/posts/logo-ssh.svg" alt="ssh logo" width="150px" height="150px" style="float:left; padding-right:25px" />
&lt;p>The SSH service is the first thing you should configure on a Linux system. With OpenSSH you get a set of tools &amp;ndash; including ssh, sshd, scp, etc. &amp;ndash; that allow you to enable secure remote shell access to your machine. If you come from the &amp;ldquo;telnet&amp;rdquo; era, you should forget about it; its replacement today is SSH.&lt;/p>
&lt;br clear="left"/></description></item></channel></rss>