Skip to main content

Questions tagged [ssh]

SSH (Secure shell) is a protocol for secure communication between computers to execute remote commands, transfer data and tunnel TCP connections.

Filter by
Sorted by
Tagged with
1 vote
0 answers
62 views

I am attempting to find information showing that when you SCP a file from a RHEL 8.10 VM hosted on Windows 11 to a USB drive, the contents of the file are not stored in a page file or buffer file ...
Brian's user avatar
  • 11
2 votes
1 answer
132 views

for what seems to be a security process that was either not fully thought through, or not documented as to what was expected to happen in the field... The first time connecting via SSH protocol (and ...
ron's user avatar
  • 463
0 votes
1 answer
216 views

from the book : Network Security, Firewalls, and VPNs, 3rd Edition IPSec works at Layer 3 of the OSI model, while SSH functions at Layers 4 and 5. as far as i know SSH is in layer 7 ( SSH is not in ...
Fady Hany's user avatar
  • 105
0 votes
1 answer
276 views

I read this Firewall Technical article and I read this paragraph: The most fundamental difference between a VPN and an SSH tunnel is how each of these technologies operates. With VPN tunneling, ...
Fady Hany's user avatar
  • 105
2 votes
1 answer
314 views

I have two servers, and I want one to talk to the other. Lets call them alpha and beta, where alpha wants to talk to beta. On alpha, I have created an RSA key pair : private key and public key. I use ...
leftcursor's user avatar
1 vote
1 answer
352 views

Question Do the public and private keys contain the ip address? Scenario Suppose "Computer I" as client has a IP as 192.168.1.A and is generated for SSH purposes its respective pair of ...
Manuel Jordan's user avatar
1 vote
0 answers
88 views

One of the benefits of using OpenPGP authentication subkeys instead of arbitrarily created SSH keyfiles, is key expiration and revocation. While there is plenty of documentation on how to use OpenPGP ...
awolf's user avatar
  • 11
1 vote
1 answer
155 views

I just know everyone is going to shout at me that public key is better but let me spell out the actual scenario first. I have a small LAN at home, basically I'm the only regular user but other members ...
Chris Green's user avatar
2 votes
2 answers
1k views

I have a number of RHEL 8 and RHEL 9 systems with FIPS mode enabled. I'm trying to use a crypto subpolicy to disable CBC ciphers, but the subpolicy seems to be ignored in FIPS mode even though it is ...
Kevin Keane's user avatar
  • 1,201
1 vote
1 answer
249 views

On my system (Ubuntu 22.04) I have encrypted my private key with a passphrase and added it to the ssh agent with ssh-add. On use of the key, I am prompted with the option "Automatically unlock ...
Antonello's user avatar
  • 151
4 votes
2 answers
218 views

This is a follow up on When I use SSH tunneling, can I assume that the server does not need to be trusted? When I am using an intermediate server I to connect to my endpoints via SSH tunnels, is it ...
aaa's user avatar
  • 173
1 vote
0 answers
78 views

I need to programmatically configure a router. However, none of our routers support ssh! Which kind of sucks! I'm putting together a suite of full regression tests looking at wifi connectivity. For ...
monkey's user avatar
  • 113
2 votes
2 answers
252 views

In GitHub's Enterprise Cloud docs it says: To use an SSH key with an organization that uses SAML single sign-on (SSO), you must first authorize the key. I understand that organization admins could ...
user1042840's user avatar
4 votes
2 answers
1k views

I have a VM with a Cloud Provider that I am able to SSH into. I've recently read about RegreSSHion (the reappearance of CVE-2006-5051, as CVE-2024-6387), and I'm wanting to make sure that I wasn't ...
user3517452's user avatar
4 votes
1 answer
3k views

The GnuPG Manual states that: This [sshcontrol] file is deprecated in favor of the "Use-for-ssh" attribute in the key files. What is now the correct way to configure gpg / gpg-agent to use ...
a2k42's user avatar
  • 183
2 votes
3 answers
229 views

I am currently automating the setup of a web server with Ansible. My two team mates should be able to run the Ansible playbook as well. Therefore, their public keys need to be added to the ...
rmoestl's user avatar
  • 121
2 votes
1 answer
4k views

hmac-sha256 [email protected] hmac-sha2-256 [email protected] hmac-sha512 [email protected] hmac-sha2-512 [email protected] Can someone help in ordering the above ...
user74320's user avatar
2 votes
1 answer
413 views

Currently looking into OpenPubKey and more specifically into OpenPubkey SSH: https://github.com/openpubkey/openpubkey https://docs.bastionzero.com/openpubkey-ssh Terminology: OPK => OpenPubkey ...
ieggel's user avatar
  • 235
0 votes
1 answer
405 views

I decided to move to self-hosting because it is cheaper. What I want to host: My personal website Some apps for fun Maybe later a Honeypot I have my old laptop acting as the main host. It has Ubuntu ...
rudeus123's user avatar
0 votes
0 answers
193 views

There have recently been several reported security issues with OpenSSH (Terrapin, double-frees, remote execution, X11 forwarding vulnerabilities..). How safe is it for a server to expose OpenSSH (...
benjimin's user avatar
  • 195
0 votes
0 answers
164 views

I'd like to use YubiKey Bio for SSH-logins. I'm wondering how often I have to show my fingerprint for authentication when I start new sessions. What's the interval? If I start a new session every 5 ...
Kevin Meier's user avatar
1 vote
2 answers
610 views

OpenSSH sshd enforces mode 0600 for authorized_keys when StrictMode is enabled. How is mode 0644 more vulnerable?
OLEGSHA's user avatar
  • 135
1 vote
2 answers
6k views

I'm trying to update the Ubuntu OpenSSH version to 9.3p2, because of the CVE-2023-38408 vulnerability, but I can't. The recomendation is update to last version: https://ubuntu.com/security/CVE-2023-...
Jhon Laurence's user avatar
0 votes
1 answer
496 views

I know that when you attempt to log in to a device via SSH, upon inputting an incorrect password, you must wait several seconds before you get another attempt. This is obviously a deterrent against ...
Blue Herring's user avatar
3 votes
1 answer
3k views

I am trying to understand the relationship between fingerprint of SSH server's public key and known_hosts file. There are two SSH servers with same public key. I, the client has the private key. I ...
rocky_alpine's user avatar

1
2 3 4 5
25