norden.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Moin! Dies ist die Mastodon-Instanz für Nordlichter, Schnacker und alles dazwischen. Folge dem Leuchtturm.

Administered by:

Server stats:

3.6K
active users

#openssh

0 posts0 participants0 posts today

Der @leyrer ist einer meiner persönlichen Helden. Er erklärt immer sehr unterhaltsam Themen rund um SSH, Kommandozeile und Co. die man auch wirklich gut bei der Arbeit anwenden kann und das Leben häufig leichter machen.

Liebe geht raus für seinen Einsatz. 🫶 ❤️‍🔥

Leider habe ich bisher nie live die Ehre gehabt, aber es ist ja noch nicht aller Tage Abend und ich hoffe er macht noch einige Talks. 😉

Überzeugt euch selbst:
media.ccc.de/search?p=Der+Leyr

media.ccc.deSearch for person "Der Leyrer" - media.ccc.deVideo Streaming Portal des Chaos Computer Clubs
#linux#ssh#openssh

Mi máquina virtual estándar sobre @proxmox es definitivamente @alpinelinux
Imagen virtual: x86_64

🔧 Configuración minimalista:

#OpenSSH en puerto alternativo:

port 8765

AllowUsers user1

PermitRootLogin no

Usuario con permisos doas:

/etc/doas.conf → permit persist alpine as root

Cortafuegos:

#UFW con reglas estrictas

Control de accesos:

#Fail2Ban notificando por #ntfy cada ban

✅ Todo en 138 MB, súper eficiente y sin paquetes innecesarios.

Suppose you have `AllowUsers foo` set in sshd_config. Normally, this will result in logs like:

[date] [host] sshd-session[pid]: Invalid user ubuntu from 195.178.110.18 port 44128

But sometimes, you see this instead:

[date] [host] sshd-session[pid]: error: PAM: Authentication error for illegal user centos from 82.193.122.91

What are the circumstances in which the attacker is able to get through sshd to interact with the PAM stack despite having given a non-permitted login? #infosec #openssh

#openssh with #yubikey
On the computer, I have only a pubkey, no privkey:

❯ ls ~/.ssh/rainer-yubikey-1*
/Users/rainer/.ssh/rainer-yubikey-1.pub

But I can ssh into a remote machine:
❯ ssh halde
Confirm user presence for key ED25519-SK SHA256:ug3mPO6C+LCYvj6FMG5HE02B5MSJw74a0sLKxooaqJY
Enter PIN for ED25519-SK key /Users/rainer/.ssh/rainer-yubikey-1:
Confirm user presence for key ED25519-SK SHA256:ug3mPO6C+LCYvj6FMG5HE02B5MSJw74a0sLKxooaqJY
User presence confirmed

The programs included with the Debian GNU/Linux system are free software;

That's the way I like it! A-ha, a-ha!

youtube.com/watch?v=gFrd3WiOcP…

Kudos to @bkoehn
KC and The Sunshine Band - That's The Way (I Like It) 1977 (Remastered)

Downloaded all portable #OpenSSH releases starting with 1.0pre2 to 9.9p2.

OpenSSH started shipping a pre-computed Diffie-Hellman key exchange group moduli file with 2.9.9. But it doesn't change on every release, like I thought it did.

The releases where the moduli file changed were:

- 2.9.9
- 3.8.1
- 4.0
- 4.9
- 6.0
- 6.1
- 6.2
- 6.9
- 7.0
- 7.3
- 7.4
- 7.7
- 7.8
- 7.9
- 8.0
- 8.1
- 8.2
- 8.3
- 8.4
- 8.5
- 8.6
- 8.7
- 8.9
- 9.1
- 9.2
- 9.4
- 9.6
- 9.8
- 9.9

Curious what sizes they shipped.

📨 Latest issue of my curated #cybersecurity and #infosec list of resources for week #08/2025 is out!

It includes the following and much more:

➝ Two Vulnerabilities in #OpenSSH
#Russia Increasingly Using #AI in Cyber Espionage
➝ South Korea Blocking Downloads of #DeepSeek
➝ Palo Alto Networks & Juniper Networks Flaws Being Exploited
#Apple to Remove E2E #Encryption in the UK;

Subscribe to the #infosecMASHUP newsletter to have it piping hot in your inbox every week-end ⬇️

infosec-mashup.santolaria.net/

infosec-mashup.santolaria.net[InfoSec MASHUP] 08/2025Two Vulns. in OpenSSH; Russia Increasingly Using AI in Cyber Espionage; South Korea Blocking Downloads of DeepSeek; Palo Alto & Juniper Flaws Being Exploited; Apple to Remove E2E Encryption in the UK;

New, critical OpenSSH vulnerabilities expose SSH servers to MitM and DoS Attacks. OpenSSH, one of the most widely used tools in the world, has two new vulnerabilities that could leave your systems vulnerable to man-in-the-middle (MitM) and denial-of-service (DoS) attacks.

What You Should Do:
✅ Update to OpenSSH 9.9p2 immediately.
✅ Disable VerifyHostKeyDNS unless absolutely necessary.
✅ Enforce connection rate limits and monitor SSH traffic for anomalies.

Read the details: bleepingcomputer.com/news/secu

BleepingComputer · New OpenSSH flaws expose SSH servers to MiTM and DoS attacksBy Bill Toulas