Is it safe to publicly share public part of our asymmetric key pairs?
#SSH #PGP #AsymmetricEncryption
One clever method to deal with #ssh #bruteforce #bots is to first allow the connection and then sever it abruptly without a proper close. No FIN, no RST.
The bot will just sit there thinking it is still connected while you are actually not spending any resources at all.
Collective defense by means of the attacker's time being wasted!
Here is a neat project visualizing this on a globe:
Do you know how to import all your documents? 📑 Find out how here ➡️ https://docs.royalapps.com/r2023/royalts/advanced/import.html
#devops #itadmin #remotemanagement #RDP #remotedesktop #ssh #data
Once there was https://blog.stribik.technology/2015/01/04/secure-secure-shell.html, which was fine. Now there is https://infosec.mozilla.org/guidelines/openssh, which doesn't include a date of the last update* (except perhaps the copyright 2017).
Where can I find current recommended SSH settings, with post-quantum and stuff?
* Oh, how I loathe websites that don't add the dates of creation and/or last update!
¿Necesitás navegar con otra IP sin configurar una VPN compleja? 🐧💻
Aprovechando el fin de semana para sumar una nueva herramienta, hoy exploramos cómo convertir una simple conexión SSH en un potente Proxy SOCKS.
Te muestro:
1️⃣ La teoría detrás de los Proxy SOCKS
2️⃣ Cómo usar el parámetro -D para el reenvío dinámico.
3️⃣ Configuración en Chrome, Firefox y hasta cómo compartirlo en tu red LAN.
#SSH #Linux #Ciberseguridad #Networking #SysAdmin #JuncoTIC #ProxySOCKS #vpn

There we are, done, 10 mins work
https://www.theapproachablegeek.co.uk/blog/ssh-into-kobo-and-android/
I had a big post about why I was doing this part written, I felt silly and nuked it, and then I realised that somebody else might want to do one of these things, so I should share how I ended up doing it. My motivation: be able to sync files from two closed-source devices I own over ssh for ease. Kobo eReader It’s a good little device and unlocking ssh was pretty easy.
Why do I find #SSH authentication keys so difficult to implement?
The closest I have found to an idiot's guide didn't work and now I have messed with so many config files I will probably have to do a fresh install to have a chance.
Does anyone know of a really simple walk-through *which is not a YouTube video* and not about GitHub? Ideally for a #RaspberryPi 5 but Debian will do.
Please RT