🐢 Ah yes, the timeless art of turning tiny PCs into a "supercomputer" 🤖, because who doesn't want to spend their weekend fiddling with SSH keys and pretending they're building Skynet? 🛠️ Just remember, kids: #CV5 vs #CV10 is the Clash of Titans no one asked for! 😂
https://www.kenkoonwong.com/blog/parallel-computing/ #tinyPCs #supercomputer #SSHkeys #Skynet #HackerNews #ngated
Setting Up A Cluster of Tiny PCs For Parallel Computing - A Note To Myself | Everyday Is A School Day

Enjoyed learning the process of setting up a cluster of tiny PCs for parallel computing. A note to myself on installing Ubuntu, passwordless SSH, automating package installation across nodes, distributing R simulations, and comparing CV5 vs CV10 performance. Fun project!

Everyday Is A School Day

Anyone got an idea how to do this:

  • expose a user on a GNU/Linux system via ssh
  • allow two keys access
    • one is the “self” key, which should be allowed as-is
    • the other is the “external” key, which triggers a password prompt
  • otherwise, password login is not permitted

I know how to do most things of this, but not all at once (AuthenticationMethods is permitted in a Match block, but we cannot match on keys, we want access to the same user, and the “self” key can also be used (agent forwarding) from nōn-local addresses.

It seems like I’ll need a custom PAM module (arrrgh, I don’t want to write one of these) that asks for the password if key B is used (does SSH expose this to PAM?).

Anyone got a better idea?

#ssh #openssh #sshkeys #pam

New post 🗝️
Okay, here's the markdown version of your comprehensive guide to setting up SSH keys, formatted for readability.
https://www.mitim.net/2025/05/ssh-key-creation-and-usage?g=5
#SSH #Hardening #SSHkeys #CyberSecurity
🚀✨ Breaking news for the 2050s: SSH keys don't scale, and guess what? SSH certificates do! 🎉 Apparently, the world is just waking up to this groundbreaking revelation—only took a few decades. 🙄🔑🔐
https://infisical.com/blog/ssh-keys-dont-scale #SSHkeys #SSHcertificates #Cybersecurity #TechNews #Innovation #HackerNews #ngated
SSH Keys Don't Scale. SSH Certificates Do

Breaking down the limitations of SSH key-based authentication and showing how SSH certificates enable modern, manageable infrastructure access.

Infisical Blog
🔐 Simplify your SSH workflow on KDE Plasma!

Learn how to use KDE Wallet and ksshaskpass for secure, seamless key management.

Read more on Medium: https://blog.schoenwald.aero/streamline-your-ssh-workflow-with-kde-plasmas-wallet-and-ksshaskpass-e22f49b6a07a

Suggestions for improvement are welcome, let's discuss!

#Linux #KDEPlasma #OpenSSH #SSHKeys #TechTips
Streamline Your SSH Workflow with KDE Plasma’s Wallet and ksshaskpass

In the world of secure communication, SSH (Secure Shell) is a cornerstone technology, enabling encrypted connections to remote servers. For KDE Plasma users, managing SSH keys and agents can be both…

Medium

Want to manage your deployments securely with DeployHQ? Learn how to create SSH keys from the command line using 5 different algorithms and configurations.
#SSHKeys #DeployHQ #Security #DevOps #ServerManagement

https://buff.ly/3MELUlz

5 Ways to Create SSH Keys from the Command Line for DeployHQ

SSH keys are essential for securely connecting to your servers. DeployHQ allows you to upload custom SSH keys to manage your deployments. In this blog post, we'll explore 5 different ways to create SSH keys from the command line, each with its own algorithm and configuration options.

in case you may have not known, if you have a #yubikey or an #onlykey or something similar you can generate SSH keys that require them, for example:

`ssh-keygen -t ed25519-sk`

more info:

https://security.stackexchange.com/a/240992

#SSH #security #ed25519 #sshkeys #linux #openssh

What is the -sk ending for ssh key types?

ssh-keygen has the following options for a key type (-t): dsa | ecdsa | ecdsa-sk | ed25519 | ed25519-sk | rsa I am not familiar with the -sk notation and it's not explained in the man page. What do...

Information Security Stack Exchange
While Linux is generally more secure than other operating systems, it is not immune to threats. This lesson covers essential security practices, including the role of antivirus and antimalware solutions.
#linux #LinuxSecurity #CyberSecurity #Antivirus #Antimalware #LinuxServerProtection #LinuxDesktop #CyberProtection #TechSavvy #FirewallConfiguration #IntrusionDetection #RealTimeScanning #SSHKeys #StrongPasswords #RegularUpdates #LinuxSafety #SecureLinux
https://linuxexpert.org/how-to-protect-a-linux-server-or-desktop/
Protecting Your Linux System from Malware: Essential Security Practices

Ensure the security of your Linux system with essential practices. Learn about antivirus solutions, regular updates, strong passwords, SSH security, and firewall configuration.

LINUXexpert

Vorhaben: Rechner neu installieren und dabei alles dokumentieren.

Eine Sache, die mir bzgl. #SSH unklar ist: Kann ich mein .ssh-Verzeichnis der alten Installation auf die neue Installation übertragen und mit den schon vorhandenen #SSHKeys immer noch ne Verbindung zu meinem #PiHole herstellen?

Oder MUSS ich mir definitiv neue Keys erstellen? 🤔

 #FollowerPower

Hackers use malicious npm packages on GitHub to steal SSH keys. Stay cautious! #cybersecurity #npmsecurity #SSHkeys