ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login
    1. Topics
    2. Tags
    3. ssh
    Log in to post
    • All categories
    • JaredBuschJ

      Hello Mr Chinese IP based hacker

      Watching Ignoring Scheduled Pinned Locked Moved IT Discussion ssh hacking erl edgemax edgerouter
      13
      0 Votes
      13 Posts
      4k Views
      wirestyle22W

      @tonyshowoff said in Hello Mr Chinese IP based hacker:

      That's why we set any WAN-fancing SSH port to something obscenely high like 41022, not for "security" but because of the logs. In fact, all of our sshd services run following that pattern, as does our internal HTTP(S) servers but the load balancers take in 80/443.

      This prevents as many services as possible from running as root, which anything running port < 1024 does. I don't think most people even know this. At the very least if there's a NAT in play, one can always set ssh and web services ports much higher and just translate the ports to avoid the same issue.

      (I know there are some work arounds like setcap on Linux, but in general this is the default behaviour on most machines)

      For some reason this made me think of The Venture Bros, Hunter Gather says:

      And we want your sad ass undercover agents to stop trying to infiltrate our group. Frankly we're tired of killing them and we can't afford the body bags!

      Useful piece of information. Thanks!

    • scottalanmillerS

      ssh_exchange_identification: Connection closed by remote host

      Watching Ignoring Scheduled Pinned Locked Moved IT Discussion linux ssh openssh
      11
      1 Votes
      11 Posts
      3k Views
      scottalanmillerS

      @johnhooks said in ssh_exchange_identification: Connection closed by remote host:

      Also a good way to use a web management interface without opening up http and https.

      I do that a bit.

    • mlnewsM

      An Introduction to Terminal Multiplexers

      Watching Ignoring Scheduled Pinned Locked Moved News linux unix command line terminal multiplexer ssh screen tmux linuxconfig
      2
      3 Votes
      2 Posts
      937 Views
      dafyreD

      I first heard about tmux here at ML. I've gotten to where I like it better than screen most of the time.

    • mlnewsM

      How To Chroot SSH Users on CentOS 7

      Watching Ignoring Scheduled Pinned Locked Moved News chroot centos centos 7 ssh linux rhel rhel 7 linuxpitstop
      3
      2 Votes
      3 Posts
      3k Views
      scottalanmillerS

      That's a good question... when does chrooting make more sense than containers today?

      Storage is one. Lots of people use chroot jails for storage purposes. Containers are heavier than chrooting which has effectively no impact on any resources.

    • wrx7mW

      Fix Slow SSH/SFTP Logins on Ubuntu

      Watching Ignoring Scheduled Pinned Locked Moved IT Discussion linux ssh ubuntu
      3
      2 Votes
      3 Posts
      916 Views
      scottalanmillerS

      @wrx7m said:

      I restarted the SSH service but I don't know if it was necessary.
      sudo service ssh restart

      It is.

    • KellyK

      OpenSSH installed, but cannot use SCP

      Watching Ignoring Scheduled Pinned Locked Moved Solved IT Discussion linux centos 6.7 ssh scp openssh centos rhel rhel 6 centos 6
      44
      1 Votes
      44 Posts
      8k Views
      scottalanmillerS

      @Kelly said in OpenSSH installed, but cannot use SCP:

      Ok, I can now copy. Thanks for all the help. I have learned a lot in just this one issue.

      Cool, just realized that this was solved. So marking it as such. Thanks.

    • stacksofplatesS

      SSH Key Pairs

      Watching Ignoring Scheduled Pinned Locked Moved IT Discussion ssh key management ssh keys public key private key ansible linux remote acces linux
      2
      6 Votes
      2 Posts
      1k Views
      stacksofplatesS

      Since the images disappeared, I added them as code.

      Also, Identity Management (FreeIPA) makes it really easy to store public keys in LDAP so any system joined to IdM can verify the key.

    • scottalanmillerS

      Accessing a Linux Server via SSH

      Watching Ignoring Scheduled Pinned Locked Moved IT Discussion linux unix ssh remote access sam linux administration
      22
      6 Votes
      22 Posts
      7k Views
      scottalanmillerS

      @BRRABill said in Accessing a Linux Server via SSH:

      @scottalanmiller said

      The default of what is to copy, paste and hit return?

      PUTTY.

      Be default when you right click something to copy, it copies it and pastes it and then hits return.

      I guess perhaps just highlighting it copies it? I like the Windows method.

      No it does not. I thought maybe you were thinking this but did not want to imply it. That's a misunderstanding of what is happening. It only does that IF your Windows environment and your actions are copying a carriage return into the clipboard (which Windows does by default.) This has nothing to do with PuTTY and is all about your Windows desktop AND it only does this if YOU make it happen, it does not do that for the rest of us. We don't copy the carriage return into the clipboard unless we want it. Windows makes this easy to control as a feature, but it is an invisible feature of the Windows environment so if you are not a Windows power user, you might not be aware that there is an interface to it that you are misusing.

      PuTTY simply does what Windows tells it to do, PuTTY has no default behaviour like you are imagining.

    • scottalanmillerS

      UNIX SSH Key Management Approaches

      Watching Ignoring Scheduled Pinned Locked Moved IT Discussion unix linux ssh key management 2fa two factor security general it knowledge nfs dns dnssec devops
      4
      5 Votes
      4 Posts
      2k Views
      A

      @scottalanmiller You should also include cloud-init

      https://cloudinit.readthedocs.org/en/latest/

    • mlnewsM

      OpenSSH Critical Update to Patch Roaming Vulnerability

      Watching Ignoring Scheduled Pinned Locked Moved News ssh openssh security eweek open source
      6
      3 Votes
      6 Posts
      2k Views
      stacksofplatesS

      @dafyre said:

      FTA, this looks like it only affects the SSH clients... Right?

      "The problem involved a bug that exposed a memory leak to a malicious SSH server," Cox explained. "Because the data in question didn't cross any trust or execution boundaries, the malicious server could get the client to possibly leak sensitive authentication key data."

      I think it's both. I ran my update playbook and everything was patched within about 3 minutes 🙂

    • gjacobseG

      Ensuring Security - Passcode cycle

      Watching Ignoring Scheduled Pinned Locked Moved IT Discussion ssh ssh tunnel security password passcode passphrase encryption
      4
      1 Votes
      4 Posts
      2k Views
      scottalanmillerS

      LUKS will work great for that. We used it in big finance to deal with stuff like government bank account details.

    • stacksofplatesS

      Network backup

      Watching Ignoring Scheduled Pinned Locked Moved IT Discussion ssh nfs samba backup
      29
      1 Votes
      29 Posts
      6k Views
      scottalanmillerS

      @Dashrender said:

      On the Windows side we have the free version of Unitrends and Veeam for VMs, but I'm not sure of one for bare metal.

      Those can become coupled if you share accounts. So it is not a panacea.

    • mlnewsM

      Comparing FTP, FTPS and SFTP

      Watching Ignoring Scheduled Pinned Locked Moved IT Discussion sftp ftp ftps ssh smartfile
      10
      3 Votes
      10 Posts
      3k Views
      scottalanmillerS

      I use Filezilla. My dad uses WinSCP. Six of one, half dozen of the other. I think WinSCP is more secure, some people have complained about security design choices in Filezilla but nothing I'm worried about.

    • bbigfordB

      Linux SCP issue

      Watching Ignoring Scheduled Pinned Locked Moved IT Discussion linux scp ssh
      21
      2 Votes
      21 Posts
      3k Views
      scottalanmillerS

      Yeah, you can get that to be pretty simple with a little work (and keys.)

    • stacksofplatesS

      Lab Project: 2FA with Google Authenticator

      Watching Ignoring Scheduled Pinned Locked Moved IT Discussion jump server ssh jumpbox 2fa linux security
      5
      4 Votes
      5 Posts
      2k Views
      stacksofplatesS

      @anonymous said:

      Nice Guide. Can you please add a link to the Jumpbox guide, I missed it.....

      http://mangolassi.it/topic/6143/linux-lab-project-building-a-linux-jump-box

    • stacksofplatesS

      SSH Key Best Practices

      Watching Ignoring Scheduled Pinned Locked Moved IT Discussion linux ssh security
      4
      1 Votes
      4 Posts
      1k Views
      AVI-NetworkGuyA

      Decent guide for this from NIST:

      http://csrc.nist.gov/publications/drafts/nistir-7966/nistir_7966_draft.pdf

    • scottalanmillerS

      Linux Lab Project: Building a Linux Jump Box

      Watching Ignoring Scheduled Pinned Locked Moved IT Discussion centos 7 ssh server jumpbox projects jump server linux jump station ntg lab scale hc3 centos unix scale
      56
      16 Votes
      56 Posts
      16k Views
      JaredBuschJ

      @JaredBusch said in Linux Lab Project: Building a Linux Jump Box:

      @scottalanmiller said in Linux Lab Project: Building a Linux Jump Box:

      First you would create users and SSH keys and then deploy them to the other boxes that you wish to connect to. This is the core of what makes the Jump Box a Jump Box. This is standard SSH key setup, nothing unique to a Jump Box.

      Did you ever make a good write up on creating users and SSH keys? If so, I cannot find it.

      I mean, I know how to make and use keys in general. But detail here would be good.

      Write up for creating the users on the jump box and getting their SSH keys. Write up for pushing users and keys to other systems that said jump box will be allowing access. Write up for control of said access. Bob and Jill have access to Jump Box. Bob has Access to servers 1 & 2. Jill has access to server 2 & 3.

      I know that @scottalanmiller has mentioned in another thread that he has a script to push this all out (question 2). I can only assume that the script has some controls to tell you which server so shove the key and user logon to (question 3).

    • AmbarishrhA

      Linux Server Security

      Watching Ignoring Scheduled Pinned Locked Moved IT Discussion linux security ssh vpn server
      11
      2 Votes
      11 Posts
      3k Views
      scottalanmillerS

      @Dashrender said:

      Why is a VPN a security risk? because they give you (generally) full access to the network?

      Correct. They create unnecessary exposure. Direct access to all hosts (typically) for all protocols and ports. The protections of firewalls and proxies are bypassed. They are generally the least secure form of access because they are the laziest - just expose everything and hope for the best.

    • Reid CooperR

      AutoSSH

      Watching Ignoring Scheduled Pinned Locked Moved IT Discussion openssh autossh ssh linux unix security
      4
      2 Votes
      4 Posts
      2k Views
      AmbarishrhA

      As the site mentions: "autossh comes in handy when you want to set up reverse SSH tunnels or mount remote folders over SSH. Essentially in any situation where persistent SSH sessions are required, autossh can be useful."

    • 1
    • 2
    • 3
    • 4
    • 5
    • 4 / 5