norden.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Moin! Dies ist die Mastodon-Instanz für Nordlichter, Schnacker und alles dazwischen. Folge dem Leuchtturm.

Administered by:

Server stats:

3.4K
active users

#ssh

13 posts13 participants0 posts today

Whoa, heads up cybersecurity folks! There's a particularly nasty bug making the rounds: **CVE-2025-32433** in Erlang/OTP SSH. And yes, it scored a perfect CVSS 10.0 🤯.

We're talking potential **unauthorized remote code execution** here. Basically, an attacker can sneak SSH messages through *before* any authentication even happens. Think about that for a second. If your SSH daemon happens to be running as root... well, that's pretty much game over for the system.

This isn't just a minor issue; it impacts *anyone* using the Erlang/OTP SSH implementation.

**The good news?** Patches are available! You'll want to update to one of these versions ASAP:
* OTP-27.3.3
* OTP-26.2.5.11
* OTP-25.3.2.20

Speaking as a pentester, gotta say, that's a clever (and worrying!) vulnerability path 😉. Another thing to keep in mind: your typical automated vulnerability scanners might completely miss this one due to the pre-auth nature.

So, what's your take? Have any of you run into this yet or started testing for it? Curious to know what tools you're finding effective for detection or exploitation testing! Let's discuss 👇

Call for volunteer data:

Looking for real sets of hash-protected ssh ~/.ssh/known_hosts files/records, to tune cracking attack stacks on. The bigger the better.

Requirements: the cipher type and the fingerprint are not needed -- just need the hash and salt (first couple of base64 fields).

Individual cracks won't be published. If you want your own cracks, strong proof of ownership required. DM me!

I have an old #asus where the #pciex16 obviously died.

Any graphics card I put into the #pciex16 slot makes it crash and prevents it from booting. I also do not get any graphics output at all at boot.

However, I can access the pc #headless via #ssh . It has #ubuntu server installed.

Is there any chance to connect this to any modern monitor having D-SUB, so that I can at least access the #bios or set up something non-headless ?

It has a 350 W power supply, so that is probably not the issue.

#OpenSSH 9.8 und höher kommt allmählich auf die Server. Da wird die Option PerSourcePenalties interessant (siehe undeadly.org/cgi?action=articl ) die fail2ban u.ä. überflüssig machen könnte.

Konfig-Beispiele sind aber noch rar gesät. Nach der manpage zu urteilen, sollte aber

PerSourcePenalties authfail:3600s

dafür sorgen dass IPs, die Brute-Force Attacken fahren für 1 Stunde geblockt werden, korrekt?

undeadly.orgOpenSSH introduces options to penalize undesirable behavior