home.social

#sshd — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #sshd, aggregated by home.social.

  1. The "magic" that makes this works seems to be pointing 'IdentityFile' to the public key, not the private. #sshd #ssh

  2. The "magic" that makes this works seems to be pointing 'IdentityFile' to the public key, not the private. #sshd #ssh

  3. Ya tengo listo el guión de un nuevo video para el canal de #YouTube de #juncotic, para el curso de Hardening y el de SSH!

    Continuamos con lo que introduje en el video anterior: 2fa con TOTP en SSH usando google-authenticator y PAM.

    Esta vez: mecanismos de recuperación si se nos cayó el celular/móvil al agua 😅

    ¿No viste el video anterior?

    Te dejo el link para que te pongás al día 👇

    youtu.be/QNeJ4a7powo

    #2fa #totp #ssh #sshd #googleauthenticator #auth #pam #linux #infosec #ciberseguridad

  4. Ya tengo listo el guión de un nuevo video para el canal de #YouTube de #juncotic, para el curso de Hardening y el de SSH!

    Continuamos con lo que introduje en el video anterior: 2fa con TOTP en SSH usando google-authenticator y PAM.

    Esta vez: mecanismos de recuperación si se nos cayó el celular/móvil al agua 😅

    ¿No viste el video anterior?

    Te dejo el link para que te pongás al día 👇

    youtu.be/QNeJ4a7powo

    #2fa #totp #ssh #sshd #googleauthenticator #auth #pam #linux #infosec #ciberseguridad

  5. Ya tengo listo el guión de un nuevo video para el canal de #YouTube de #juncotic, para el curso de Hardening y el de SSH!

    Continuamos con lo que introduje en el video anterior: 2fa con TOTP en SSH usando google-authenticator y PAM.

    Esta vez: mecanismos de recuperación si se nos cayó el celular/móvil al agua 😅

    ¿No viste el video anterior?

    Te dejo el link para que te pongás al día 👇

    youtu.be/QNeJ4a7powo

    #2fa #totp #ssh #sshd #googleauthenticator #auth #pam #linux #infosec #ciberseguridad

  6. Ya tengo listo el guión de un nuevo video para el canal de #YouTube de #juncotic, para el curso de Hardening y el de SSH!

    Continuamos con lo que introduje en el video anterior: 2fa con TOTP en SSH usando google-authenticator y PAM.

    Esta vez: mecanismos de recuperación si se nos cayó el celular/móvil al agua 😅

    ¿No viste el video anterior?

    Te dejo el link para que te pongás al día 👇

    youtu.be/QNeJ4a7powo

    #2fa #totp #ssh #sshd #googleauthenticator #auth #pam #linux #infosec #ciberseguridad

  7. Ya tengo listo el guión de un nuevo video para el canal de #YouTube de #juncotic, para el curso de Hardening y el de SSH!

    Continuamos con lo que introduje en el video anterior: 2fa con TOTP en SSH usando google-authenticator y PAM.

    Esta vez: mecanismos de recuperación si se nos cayó el celular/móvil al agua 😅

    ¿No viste el video anterior?

    Te dejo el link para que te pongás al día 👇

    youtu.be/QNeJ4a7powo

    #2fa #totp #ssh #sshd #googleauthenticator #auth #pam #linux #infosec #ciberseguridad

  8. Claramente no todo se puede hacer con #SSH 😜

    Acá probando "sudo sshd -t" para verificar la sintaxis del archivo de configuración del servidor.

    Se viene nuevo contenido en #JuncoTIC, se nota? 😉

    #gnu #linux #openssh #sshd #humor #lol

  9. Claramente no todo se puede hacer con #SSH 😜

    Acá probando "sudo sshd -t" para verificar la sintaxis del archivo de configuración del servidor.

    Se viene nuevo contenido en #JuncoTIC, se nota? 😉

    #gnu #linux #openssh #sshd #humor #lol

  10. Claramente no todo se puede hacer con #SSH 😜

    Acá probando "sudo sshd -t" para verificar la sintaxis del archivo de configuración del servidor.

    Se viene nuevo contenido en #JuncoTIC, se nota? 😉

    #gnu #linux #openssh #sshd #humor #lol

  11. Claramente no todo se puede hacer con #SSH 😜

    Acá probando "sudo sshd -t" para verificar la sintaxis del archivo de configuración del servidor.

    Se viene nuevo contenido en #JuncoTIC, se nota? 😉

    #gnu #linux #openssh #sshd #humor #lol

  12. Claramente no todo se puede hacer con #SSH 😜

    Acá probando "sudo sshd -t" para verificar la sintaxis del archivo de configuración del servidor.

    Se viene nuevo contenido en #JuncoTIC, se nota? 😉

    #gnu #linux #openssh #sshd #humor #lol

  13. Once there was blog.stribik.technology/2015/0, which was fine. Now there is infosec.mozilla.org/guidelines, which doesn't include a date of the last update* (except perhaps the copyright 2017).

    Where can I find current recommended SSH settings, with post-quantum and stuff?

    * Oh, how I loathe websites that don't add the dates of creation and/or last update!

    #ssh #sshd #sshd_config

  14. Once there was blog.stribik.technology/2015/0, which was fine. Now there is infosec.mozilla.org/guidelines, which doesn't include a date of the last update* (except perhaps the copyright 2017).

    Where can I find current recommended SSH settings, with post-quantum and stuff?

    * Oh, how I loathe websites that don't add the dates of creation and/or last update!

    #ssh #sshd #sshd_config

  15. Once there was blog.stribik.technology/2015/0, which was fine. Now there is infosec.mozilla.org/guidelines, which doesn't include a date of the last update* (except perhaps the copyright 2017).

    Where can I find current recommended SSH settings, with post-quantum and stuff?

    * Oh, how I loathe websites that don't add the dates of creation and/or last update!

    #ssh #sshd #sshd_config

  16. Once there was blog.stribik.technology/2015/0, which was fine. Now there is infosec.mozilla.org/guidelines, which doesn't include a date of the last update* (except perhaps the copyright 2017).

    Where can I find current recommended SSH settings, with post-quantum and stuff?

    * Oh, how I loathe websites that don't add the dates of creation and/or last update!

    #ssh #sshd #sshd_config

  17. Once there was blog.stribik.technology/2015/0, which was fine. Now there is infosec.mozilla.org/guidelines, which doesn't include a date of the last update* (except perhaps the copyright 2017).

    Where can I find current recommended SSH settings, with post-quantum and stuff?

    * Oh, how I loathe websites that don't add the dates of creation and/or last update!

    #ssh #sshd #sshd_config

  18. 找了个时间优化了服务器便利性和“安全性”

    1. Termius访问
    Termius生成三个密钥分配给三台服务器
    export到~/.ssh/authorized_keys
    检查authorized_keys内容正确
    测试密钥&无密码登录

    2. 配置ufw
    sudo ufw default deny incoming
    sudo ufw default allow outgoing
    sudo ufw allow http
    sudo ufw allow https
    sudo ufw allow 特殊端口/tcp
    sudo ufw enable
    sudo ufw status verbose

    3. 配置fail2ban
    sudo nano /etc/fail2ban/jail.local
    [DEFAULT]
    bantime = 1h
    findtime = 10m
    maxretry = 5
    banaction = ufw
    ignoreip = 127.0.0.1/8 ::1 X Y Z
    [sshd]
    enabled = true
    port = 特殊端口
    backend = systemd

    sudo apt update && sudo apt install python3-systemd -y
    sudo systemctl enable --now fail2ban
    sudo systemctl restart fail2ban
    sudo fail2ban-client status sshd

    3. 配置sshd_config
    sudo nano /etc/ssh/sshd_config
    Port 特殊端口
    PermitRootLogin no
    PubkeyAuthentication yes
    PasswordAuthentication no

    sudo sshd -t
    sudo systemctl restart ssh

    4. 更改hostname
    sudo hostnamectl set-hostname xxx
    sudo nano /etc/hosts
    修改127.0.1.1 后主机名为xxx
    hostnamectl status

    5. 配置互通
    ssh-keygen -t ed25519 -C "from_$(hostname)" -N "" -f ~/.ssh/id_ed25519
    cat id_ed25519.pub
    nano ~/.ssh/authorized_keys
    一共三行,Termius pub、其他两台服务器的pub

    6. 配置Alias
    nano ~/.bashrc
    alias nc='ssh -p 特殊端口 jay@ipX'
    alias cc='ssh -p 特殊端口 jay@ipY'
    alias hd='ssh -p 特殊端口 jay@ipZ'
    source ~/.bashrc
    nc (netcup)
    cc (clawcloud)
    hd (hostdzire)
    或者
    nano ~/.ssh/config
    Host nc
    HostName X
    Port 特殊端口
    User jay
    Host cc
    HostName Y
    Port 特殊端口
    User jay
    Host hd
    HostName Z
    Port 特殊端口
    User jay
    ssh nc
    ssh cc
    ssh hd
    还可以加上“ProxyJump cc”连 xxx 之前先跳到 cc

    #ssh #sshd #pub #alias #ProxyJump #authorized_keys #termius #ufw #fail2ban

  19. 找了个时间优化了服务器便利性和“安全性”

    1. Termius访问
    Termius生成三个密钥分配给三台服务器
    export到~/.ssh/authorized_keys
    检查authorized_keys内容正确
    测试密钥&无密码登录

    2. 配置ufw
    sudo ufw default deny incoming
    sudo ufw default allow outgoing
    sudo ufw allow http
    sudo ufw allow https
    sudo ufw allow 特殊端口/tcp
    sudo ufw enable
    sudo ufw status verbose

    3. 配置fail2ban
    sudo nano /etc/fail2ban/jail.local
    [DEFAULT]
    bantime = 1h
    findtime = 10m
    maxretry = 5
    banaction = ufw
    ignoreip = 127.0.0.1/8 ::1 X Y Z
    [sshd]
    enabled = true
    port = 特殊端口
    backend = systemd

    sudo apt update && sudo apt install python3-systemd -y
    sudo systemctl enable --now fail2ban
    sudo systemctl restart fail2ban
    sudo fail2ban-client status sshd

    3. 配置sshd_config
    sudo nano /etc/ssh/sshd_config
    Port 特殊端口
    PermitRootLogin no
    PubkeyAuthentication yes
    PasswordAuthentication no

    sudo sshd -t
    sudo systemctl restart ssh

    4. 更改hostname
    sudo hostnamectl set-hostname xxx
    sudo nano /etc/hosts
    修改127.0.1.1 后主机名为xxx
    hostnamectl status

    5. 配置互通
    ssh-keygen -t ed25519 -C "from_$(hostname)" -N "" -f ~/.ssh/id_ed25519
    cat id_ed25519.pub
    nano ~/.ssh/authorized_keys
    一共三行,Termius pub、其他两台服务器的pub

    6. 配置Alias
    nano ~/.bashrc
    alias nc='ssh -p 特殊端口 jay@ipX'
    alias cc='ssh -p 特殊端口 jay@ipY'
    alias hd='ssh -p 特殊端口 jay@ipZ'
    source ~/.bashrc
    nc (netcup)
    cc (clawcloud)
    hd (hostdzire)
    或者
    nano ~/.ssh/config
    Host nc
    HostName X
    Port 特殊端口
    User jay
    Host cc
    HostName Y
    Port 特殊端口
    User jay
    Host hd
    HostName Z
    Port 特殊端口
    User jay
    ssh nc
    ssh cc
    ssh hd
    还可以加上“ProxyJump cc”连 xxx 之前先跳到 cc

    #ssh #sshd #pub #alias #ProxyJump #authorized_keys #termius #ufw #fail2ban

  20. The mighty world of BSD

    Playing with again smolBSD, a fantastic metaOS system that I talked about a few weeks ago.
    I'm a newbie, a greenhorn, when it comes to meta-operating systems built on top of NetBSD.

    I am very eager to learn by doing, making mistakes in the process, correcting and feel the warmth of the BSD community, who is happy to correct, esp when I show that I read the docs after making the mistakes

    The journey is fantastic, the learning process is fun. microVM's are amazing. I've registered 11ms boot times on this small machine with a few CPU cores (and 40GB RAM). The fun is endless

    #programming #technology #BSD #netBSD #metaOS #microVM #networking #qemu #host #bmake #curl #sshd #Linux

    smolbsd.org/

  21. The mighty world of BSD

    Playing with again smolBSD, a fantastic metaOS system that I talked about a few weeks ago.
    I'm a newbie, a greenhorn, when it comes to meta-operating systems built on top of NetBSD.

    I am very eager to learn by doing, making mistakes in the process, correcting and feel the warmth of the BSD community, who is happy to correct, esp when I show that I read the docs after making the mistakes

    The journey is fantastic, the learning process is fun. microVM's are amazing. I've registered 11ms boot times on this small machine with a few CPU cores (and 40GB RAM). The fun is endless

    #programming #technology #BSD #netBSD #metaOS #microVM #networking #qemu #host #bmake #curl #sshd #Linux

    smolbsd.org/

  22. The mighty world of BSD

    Playing with again smolBSD, a fantastic metaOS system that I talked about a few weeks ago.
    I'm a newbie, a greenhorn, when it comes to meta-operating systems built on top of NetBSD.

    I am very eager to learn by doing, making mistakes in the process, correcting and feel the warmth of the BSD community, who is happy to correct, esp when I show that I read the docs after making the mistakes

    The journey is fantastic, the learning process is fun. microVM's are amazing. I've registered 11ms boot times on this small machine with a few CPU cores (and 40GB RAM). The fun is endless

    #programming #technology #BSD #netBSD #metaOS #microVM #networking #qemu #host #bmake #curl #sshd #Linux

    smolbsd.org/

  23. The mighty world of BSD

    Playing with again smolBSD, a fantastic metaOS system that I talked about a few weeks ago.
    I'm a newbie, a greenhorn, when it comes to meta-operating systems built on top of NetBSD.

    I am very eager to learn by doing, making mistakes in the process, correcting and feel the warmth of the BSD community, who is happy to correct, esp when I show that I read the docs after making the mistakes

    The journey is fantastic, the learning process is fun. microVM's are amazing. I've registered 11ms boot times on this small machine with a few CPU cores (and 40GB RAM). The fun is endless

    #programming #technology #BSD #netBSD #metaOS #microVM #networking #qemu #host #bmake #curl #sshd #Linux

    smolbsd.org/

  24. The mighty world of BSD

    Playing with again smolBSD, a fantastic metaOS system that I talked about a few weeks ago.
    I'm a newbie, a greenhorn, when it comes to meta-operating systems built on top of NetBSD.

    I am very eager to learn by doing, making mistakes in the process, correcting and feel the warmth of the BSD community, who is happy to correct, esp when I show that I read the docs after making the mistakes

    The journey is fantastic, the learning process is fun. microVM's are amazing. I've registered 11ms boot times on this small machine with a few CPU cores (and 40GB RAM). The fun is endless

    #programming #technology #BSD #netBSD #metaOS #microVM #networking #qemu #host #bmake #curl #sshd #Linux

    smolbsd.org/

  25. Monitoring my ssh connections on the SBC Pi5

    the command used is this fuction

    `function psgrep() { ps axuf | grep -v grep | grep "$@" -i --color=auto; }`

    #networking #sshd #ssh #ps #grep #psgrep #OpenSource #POSIX

  26. Monitoring my ssh connections on the SBC Pi5

    the command used is this fuction

    `function psgrep() { ps axuf | grep -v grep | grep "$@" -i --color=auto; }`

    #networking #sshd #ssh #ps #grep #psgrep #OpenSource #POSIX

  27. Monitoring my ssh connections on the SBC Pi5

    the command used is this fuction

    `function psgrep() { ps axuf | grep -v grep | grep "$@" -i --color=auto; }`

    #networking #sshd #ssh #ps #grep #psgrep #OpenSource #POSIX

  28. Monitoring my ssh connections on the SBC Pi5

    the command used is this fuction

    `function psgrep() { ps axuf | grep -v grep | grep "$@" -i --color=auto; }`

    #networking #sshd #ssh #ps #grep #psgrep #OpenSource #POSIX

  29. Monitoring my ssh connections on the SBC Pi5

    the command used is this fuction

    `function psgrep() { ps axuf | grep -v grep | grep "$@" -i --color=auto; }`

    #networking #sshd #ssh #ps #grep #psgrep #OpenSource #POSIX

  30. Some how I am very envious of the 60MB RAM footprint while booting into a #linode #vps. The best I could get onto my #homelab is 300MB usage on a #Ubuntu cloud image. This is unfortunately the same as my desktop #ArchLinux with #KDE running.

    The Ubuntu server image idled at 600MB RAM usage with #docker & #sshd. The culprits using most ram are #snapd & #multipathd.

  31. Some how I am very envious of the 60MB RAM footprint while booting into a #linode #vps. The best I could get onto my #homelab is 300MB usage on a #Ubuntu cloud image. This is unfortunately the same as my desktop #ArchLinux with #KDE running.

    The Ubuntu server image idled at 600MB RAM usage with #docker & #sshd. The culprits using most ram are #snapd & #multipathd.

  32. Some how I am very envious of the 60MB RAM footprint while booting into a #linode #vps. The best I could get onto my #homelab is 300MB usage on a #Ubuntu cloud image. This is unfortunately the same as my desktop #ArchLinux with #KDE running.

    The Ubuntu server image idled at 600MB RAM usage with #docker & #sshd. The culprits using most ram are #snapd & #multipathd.

  33. Some how I am very envious of the 60MB RAM footprint while booting into a #linode #vps. The best I could get onto my #homelab is 300MB usage on a #Ubuntu cloud image. This is unfortunately the same as my desktop #ArchLinux with #KDE running.

    The Ubuntu server image idled at 600MB RAM usage with #docker & #sshd. The culprits using most ram are #snapd & #multipathd.

  34. Some how I am very envious of the 60MB RAM footprint while booting into a #linode #vps. The best I could get onto my #homelab is 300MB usage on a #Ubuntu cloud image. This is unfortunately the same as my desktop #ArchLinux with #KDE running.

    The Ubuntu server image idled at 600MB RAM usage with #docker & #sshd. The culprits using most ram are #snapd & #multipathd.

  35. @clacke Yes and no…
    Instead of the overhead of containers, my 'jump' machines bind specific keys to the ssh commands that do the specifically authorized next hops and (where possible) restrict to specific client IPs. The OS of those machines are only accessible over a VPN or (for some VMs) a tightly secured web interface that has VNC over WebSockets inside a private network to their virtual consoles.

    #infosec #bastion #jumphost
    #ssh #sshd #OpenSSH

  36. @clacke Yes and no…
    Instead of the overhead of containers, my 'jump' machines bind specific keys to the ssh commands that do the specifically authorized next hops and (where possible) restrict to specific client IPs. The OS of those machines are only accessible over a VPN or (for some VMs) a tightly secured web interface that has VNC over WebSockets inside a private network to their virtual consoles.

    #infosec #bastion #jumphost
    #ssh #sshd #OpenSSH

  37. @clacke Yes and no…
    Instead of the overhead of containers, my 'jump' machines bind specific keys to the ssh commands that do the specifically authorized next hops and (where possible) restrict to specific client IPs. The OS of those machines are only accessible over a VPN or (for some VMs) a tightly secured web interface that has VNC over WebSockets inside a private network to their virtual consoles.

    #infosec #bastion #jumphost
    #ssh #sshd #OpenSSH

  38. @clacke Yes and no…
    Instead of the overhead of containers, my 'jump' machines bind specific keys to the ssh commands that do the specifically authorized next hops and (where possible) restrict to specific client IPs. The OS of those machines are only accessible over a VPN or (for some VMs) a tightly secured web interface that has VNC over WebSockets inside a private network to their virtual consoles.

    #infosec #bastion #jumphost
    #ssh #sshd #OpenSSH

  39. @clacke Yes and no…
    Instead of the overhead of containers, my 'jump' machines bind specific keys to the ssh commands that do the specifically authorized next hops and (where possible) restrict to specific client IPs. The OS of those machines are only accessible over a VPN or (for some VMs) a tightly secured web interface that has VNC over WebSockets inside a private network to their virtual consoles.

    #infosec #bastion #jumphost
    #ssh #sshd #OpenSSH

  40. When you have an ssh jumphost, the trivial setup is one that conflates OS access and application access.

    The application is ssh, providing the jump to the privileged network, but ssh also allows OS access, potentially allowing privilege escalation within the jumphost.

    Are people taking this seriously and e.g. running an unprivileged sshd inside a container? Access the OS over port 22 to the privileged sshd, restricting that to the segregated admin network, access the jumping over port 2222 and minimize the attack surface on the outer host?

    #infosec #bastion #jumphost
    #ssh #sshd #OpenSSH

  41. When you have an ssh jumphost, the trivial setup is one that conflates OS access and application access.

    The application is ssh, providing the jump to the privileged network, but ssh also allows OS access, potentially allowing privilege escalation within the jumphost.

    Are people taking this seriously and e.g. running an unprivileged sshd inside a container? Access the OS over port 22 to the privileged sshd, restricting that to the segregated admin network, access the jumping over port 2222 and minimize the attack surface on the outer host?

    #infosec #bastion #jumphost
    #ssh #sshd #OpenSSH

  42. When you have an ssh jumphost, the trivial setup is one that conflates OS access and application access.

    The application is ssh, providing the jump to the privileged network, but ssh also allows OS access, potentially allowing privilege escalation within the jumphost.

    Are people taking this seriously and e.g. running an unprivileged sshd inside a container? Access the OS over port 22 to the privileged sshd, restricting that to the segregated admin network, access the jumping over port 2222 and minimize the attack surface on the outer host?

    #infosec #bastion #jumphost
    #ssh #sshd #OpenSSH