Guides 11792 Published by Philipp Esselbach 0

The guide explains how a chroot jail can confine SSH sessions to a limited directory tree, protecting the rest of the system even if a user gains shell access. It walks through creating a minimal file hierarchy under /srv/chroot/ssh, copying only the essential binaries and libraries, setting root ownership and restrictive permissions so sshd will accept the session. By editing sshd_config with a Match User block that specifies ChrootDirectory, disables TCP and X11 forwarding, and forces internal‑sftp, it keeps users locked in an SFTP‑only sandbox while still allowing file transfers. The post also covers practical steps for adding a test user, restarting the daemon, troubleshooting common errors like missing /dev/null or improper permissions, and notes when a chroot is overkill if SSH is not exposed to the Internet.

Guides 11792 Published by Philipp Esselbach 0

The guide explains how to manage Ubuntu 22.04’s AppArmor security system by checking its status with systemctl, toggling individual profiles into “complain” mode using aa-complain (and later back to enforcement with aa-enforce) for selective debugging, and completely stopping or masking the AppArmor daemon via systemctl stop/mask when broader troubleshooting is needed. It also shows how to restore protection by unmasking, starting, and enabling the service at boot. Additionally, it warns common mistakes such as forgetting to reload edited profiles with apparmor_parser -r or using masking for temporary stops. A concise cheat‑sheet of commands for each action rounds out the tutorial.

Guides 11792 Published by Philipp Esselbach 0

The guide explains how to install and use the lightweight command‑line load tester Siege on Ubuntu 22.04, starting with a simple apt update && apt install siege and confirming the installation via siege --version. It then shows how to create a URL list (e.g., urls.txt) and run a basic benchmark with options such as -c10 -t30S -f urls.txt, interpreting the concise summary output that includes transaction rate, concurrency, and error counts. Optional flags like --keep-alive, -d for delays, and --csv for exporting results are suggested to make tests more realistic and easier to analyze. Common pitfalls such as missing SSL libraries or firewall rules blocking outbound traffic are highlighted so users can avoid “connection timed out” errors.

Guides 11792 Published by Philipp Esselbach 0

The guide explains how to replace Debian 11’s default MariaDB 10.5 with the newer 10.8 by adding MariaDB’s official repository, importing its signing key, and updating APT sources. It then walks through installing the mariadb‑server package, securing the installation with mysql_secure_installation, and verifying the installed version. It also advises clearing stale caches if apt cannot find the package and shows how to enable, start, and check the service status. Following these steps results in a fully functional MariaDB 10.8 server on Bullseye.

Guides 11792 Published by Philipp Esselbach 0

The guide walks you through safely upgrading the apache2 package on Debian 11 by first checking the current version and installed packages, then backing up the entire /etc/apache2 configuration directory. It instructs you to refresh APT’s indices with apt update and upgrade Apache either via apt upgrade or apt install --only-upgrade, followed by a config test (apachectl configtest) before gracefully reloading or restarting the service. Finally, it shows how to verify that Apache is running correctly using systemctl status. An optional step explains enabling Bullseye‑backports to install a newer Apache release if needed.