@DustinB3403 I've already got the password on the keys. I've just not disabled password logins in case i kill something and need to get access :). Planning on removing it once i've "SSH Key's" the other servers.
Posts
-
RE: Securing SSHposted in IT Discussion
-
RE: Securing SSHposted in IT Discussion
@DustinB3403 I will once i've played around a bit more with changing other settings for SSH.
-
RE: Securing SSHposted in IT Discussion
So, I've done the keys and all is working with my Zabbix and Unifi servers. Not disabled password logins yet (apart from root).
-
RE: Miscellaneous Tech Newsposted in News
Criminals on CCTV: Scammers caught red-handed
Hundreds of thousands of people fall victim to scams in the UK every year.
Many are run from criminal call centres abroad, where teams of fraudsters operate around the clock.One man in the UK, who goes by the name "Jim Browning", decided to do something about it. He hacked into a call centre in India from where scammers target their victims.
-
RE: Securing SSHposted in IT Discussion
@JaredBusch :face_with_stuck-out_tongue_winking_eye: :face_with_stuck-out_tongue_winking_eye: :face_with_stuck-out_tongue_closed_eyes: :face_with_stuck-out_tongue_closed_eyes:
I'll try moving to Fedora again at some point. -
RE: Securing SSHposted in IT Discussion
@JaredBusch said in Securing SSH:
This is your friend.
ssh-copy-id -i ~/.ssh/id_ed25519.pub user@ipcommand not found in powershell
bu that's a windows problem. -
RE: Securing SSHposted in IT Discussion
@Dashrender To be honest that's my next step is now to make some keys for my laptop, and see how and where they go

but my guess is in the same authorized_keys file on a separate line -
RE: Time Clock Software?posted in IT Business
Wow, i was looking into this as well this morning as we found a few spare Android Tablets.
All we need is simple Employee clock in clock out. Simple touch screen click your name in and click it out.
Maybe in the future use RFID or NFC tag. -
RE: Securing SSHposted in IT Discussion
Silly question, i think i know the answer but checking

If i'm using a windows machine logging in as a domain user - [email protected]I want to use SSH key pairs to log into my Zabbix Server. This was setup (On linux CentOS8) with two users when installing "root" and "zabb02".
Do i need a user called myname (or [email protected]) on the zabbix server?
Also guess i generate the key pair on my Windows machine and upload the pub side to the Server(s)
-
RE: Miscellaneous Tech Newsposted in News
Redcar council IT hack confirmed as ransomware attack
A council has admitted its IT service was targeted by hackers, who scrambled files and made a demand for money.
Systems at Redcar and Cleveland Council have been down for almost three weeks after the ransomware attack. -
RE: Good Specs to Build a Gaming PC (asking for a friend)posted in IT Discussion
My rule of thumb is when asked.
- Whats the budget
- What game(s) do they want to play
If Graphics card required to play at playable res and frame rate costs more than a console and the game is available on console THEN go console

But knowing what they expect from the systems helps, as their expectations on what they can run off £300 may differ from what anyone can build.
-
RE: Securing SSHposted in IT Discussion
I think the common things i've seen so far are -
Password or Password Less Public/Private Keys
Timeouts
Disallow root logon
Harden Firewall
White-list IP's that can access.Steps I used to connect to my Zabbix Server (CentOS
from Win10created a folder c:\users<username>.ssh
in powershell ran this commandssh-keygen -o -a 100 -t ed25519 -C "[email protected] Desktop"Typed on the password i wanted to use (you can run a different command to have a password less key - see below)
This generated two files in .ssh - id_ed25519 and id_ed25519.pubstill in powershell i ssh'd onto the zabbix server
ssh <user>@<ip>Once in ran the following commands
sudo mkdir ~/.ssh sudo nano ~/.ssh/authorized_keyscopy the contents of the .pub file on the windows machine
sudo chown YourUserName:YourUserName ~/.ssh -R sudo chmod 700 ~/.ssh sudo chmod 600 ~/.ssh/authorized_keysThen from powershell
ssh <user>@<ip>and it just asked me for the key password and i'm in
Updated - 28/02/2020
-
Securing SSHposted in IT Discussion
Following on from my post, what do people recommend.
This is open for both Internal Only servers (like me) or hosted servers that you might need/want SSH on.
-
RE: What Are You Doing Right Nowposted in Water Closet
When securing SSH with Public/Private Keys, do i need to generate "Keys" for every person that will login?
Or can we "Share" a common key.I'm locking down some Linux Servers over the next few weeks, they are all internal servers and not accessed remotely via the internet. I'm the main person that will log in via SSH mainly to run updates and change the odd config file, but i want to check if i need to give other users SSH access.
-
RE: What Are You Doing Right Nowposted in Water Closet
@jmoore Yeah i love all my Huawei phones, i have a P20 Pro and the kids have the Lite.
I've always been a fan and don't think i'll change (unless they stop selling phones
).As you said imo if they are doing something everyone else most probably doing the same
