ssh's questions - English 1answer

886 ssh questions.

I am using AWS. I need to connect with a local SSH client to Linux EC2/ECS instances. I also need to connect with a local PostgreSQL client to RDS instances. There are tutorials for creating SSH ...

Out of curiosity, and also to check whether this is doable at all: Is there any way using standard tools to assign an expiry date [only] to the passphrase of an ssh private key, or to enforce the ...

I've been searching for the answer to this but haven't had much luck. What is the difference between SSH version 1 and 1.5? Is 1.5 a release of 1? As in 1.2, 1.3, 1.4, 1.5? Are there any ...

I tunneled data transition as 22-22 and 2222-80, between my PC and VPS: ssh user@1.1.1.1 -L 22:localhost:22 -L 2222:localhost:80 -i ~/.ssh/key To make sure both tunnels were created, I executed lsof ...

I know it's recommended to use a VPN with a hotel WiFi but if I'm in a hurry and don't have time to setup my own VPN server would an SSH tunnel (invoked with ssh -D) work just as well to secure my web ...

I understand that RSA fingerprints are used to verify that you are really connecting directly to who you want to connect to, and not someone else posing as that site. Like when you do a git push, it ...

I've updated Kali 2.0 to newest version - it is installed using VMWare. Now, every time I use hydra to brute-force SSH, I get the following error: [ERROR] target ssh://192.168.16.128:22/ does not ...

I'm posting this question from a moving train! (Ok, maybe that's not so impressive.) This train has an annoying WiFi - it's low-throughput, high-latency, tends to lose packets, and blocks most kinds ...

I am implementing a home alarm system with raspberry and I need to access it from the external network. The initial idea was to use cascade VPN and ssh (in my university to connect to the cluster I ...

Say that A is behind a firewall that logs all packets, communicating with B over a publickey-authenticated SSH connection: A <-------- {ssh} --------> B v v [...

Firstly sorry, maybe dumb question, but I have one service running on my server which can be operated only by telnet (port 23), but I know that telnet is insecure, so I blocked port 23 in iptables ...

Suppose I'm about to connect to a new (unauthenticated to me) server. I've previously provided my ssh public key to the server owner (who populates it in the appropriate authorized_keys file). The ...

How does Amazon Web Services generate SSH Keys? Does it generate the key pair completely in the browser or does it generate the keys in the server and send us the private key over HTTPS? I tried to ...

I was pulled up by my ISP in work for having a machine making dozens of outbound SSH connections. I tracked down the machine and took it off the network. Problem is there are several other machines ...

I was grepping through /var/log/auth.log and noticed that for some reason, not every time, but sometimes when I would log in via SSH I would see entries like the following - where there were multiple ...

SSH into router [closed]

3 answers, 127 views ssh router
Is it possible to gain access to a router by SSHing into it. I understand that you can ssh into a specific server or machine with SSH, but can you do the same thing with a router if you know the ...

Ssh-keygen now supports a new key encryption format with -o, and configurable rounds of key stretching with -a. So I want to pick a -a that takes a chosen amount of time on my system. But I don't ...

I am trying to SSH into my fresh Ubuntu 12.04 server. At the client I have deleted known_hosts. SSH to the host for the first time has it offering me an ECDSA key to verify. The problem is I know ...

I have many client devices that I need to reverse SSH tunnel into. I am finding that managing all these certificate files are becoming cumbersome. I am looking into a centralized authentication system....

If I use TLS as the protocol to send SSL encrypted packages through a SSH tunnel would this connection be safer than using any of the tools alone? ** EDIT ** Suppose I would TLS(SSL(SSH(data))) (...

I configured my server to encrypt user passwords using 500,000 rounds of SHA-512. The question is, how does the standard AES-128-CBC encrypted SSH private key stack up to that, provided the same (or ...

Most users would simply type ssh-keygen and accept what they're given by default. But what are the best practices for generating ssh keys with ssh-keygen? For example: Use -o for the OpenSSH key ...

I am a bit confused on how SSH encryption works. From reading this question, I see you can use a private key to authenticate with the -i flag. I also know think that SSH encrypts data using ...

In an ideal world, where all links are fully trustworthy from a data integrity point of view, with proper settings, modern SSH can be more or less assumed to be fully secure against eavesdropping on ...

I have a website which commits to a git local repository all the changes done. I need to automatically push them directly from the web server to a remote Bitbucket repository. The authentication ...

I have a couple of Ubuntu 16.04 servers. I want my server to be secure and ensure they can only be accessible by me and things. I check the auth.log and last. But I heard that hackers can change the ...

I have set of Virtual Machines (VMWare) and I want to connect to remote SFTP server using public-private key based authentication. Initial transfer of public keys from each of the VMs to remote SFTP ...

I have 2 yubikeys and both are having the same GPG master key besides 3 subkeys for encrypting, signing and authentication, I can encrypt/decrypt and everything regarding gpg seems to be working fine, ...

I have a web app hosted in Digital Ocean and use Laravel Forge to keep a daemon running an SSH tunnel to another server (i.e. ssh -L XXX:127.0.0.1:XXX -p XXXX root@[ipaddress]). I do this in order to ...

From FTP to SSH

2 answers, 196 views exploit ssh ftp openssh
Currently, I am doing a penetration testing laboratory with a server with the following services: Nmap scan report for 10.0.11.125 Host is up (1.3s latency). Not shown: 998 closed ports PORT STATE ...

I found a private key which seems to be in the putty private key format. The key has the following header: ---- BEGIN SSH2 ENCRYPTED PRIVATE KEY ---- Subject: <sensitive> Comment: <...

I have a home server with access to the Internet. It runs a TeamSpeak server service. On my router, ports 30033 and 10011 are forwarded to the server to allow TeamSpeak to properly run from the ...

I am running a VM on a spare laptop we have in the office, and have set it up for SSH access from my workstation. Currently I am using user/password authentication, but I would like to remove the ...

From what I read, SSH is mainly used for remotely accessing a machine. If I don't want anyone remotely accessing my machine, nor myself included, is it ok to delete these configuration files from my ...

What is the difference between SSH and SSL? Which one is more secure, if you can compare them together? Which has more potential vulnerabilities?

I have a WordPress website which has 4 different environments: Development Preview Staging Production These all are connected to 4 remote Git repositories: development, preview, staging and ...

I ssh to my AWS instances via WinSCP and it has public-private key authentication, password authentication is disabled. All the sessions are saved on WinSCP, so I click on the IP of the machine and I ...

If someone is using an insecure wireless connection (for example a hot spot in a coffee shop) does it pose a threat even if the person is using a secure application layer protocol? What I mean by ...

I have 2 severs and 12 systems (All having UBUNTU) connected to each other over LAN. The 12 systems use multiple databases (Redis/Postgres etc.) hosted on the 2 servers using LAN. Now, I need to ...

I recently started a job at a small company where the CTO prefers to host SSH services at obscure, high numbered ports on our servers rather than the well known port 22. His rationale is that "it ...

I reviewed the auth.log file on my Ubuntu server to find: [preauth] Feb 22 17:39:18 code-storage sshd[17271]: Disconnected from 147.135.192.203 port 49408 [preauth] Feb 22 17:40:15 code-storage sshd[...

Ansible in a cloud image

2 answers, 32 views ssh
I am looking into using Ansible to manage my systems and going through its documentation I found a recommendation to run the Ansible commands on a cloud image rather than my local laptop. My ...

I've got an SSH server setup in a remote location, which I use to tunnel traffic from an android tablet. On the tablet, I have the Cisco AnyConnect app to connect to my company's VPN. We want to be ...

I am looking to implement access controls through CA-signed public ssh keys, as described in the article Scalable and secure access with SSH. I am trying to conceive how our security team will manage ...

I'm trying to set up corkscrew to make an SSH tunnel over HTTP, but I need to add custom headers after the "CONNECT" statement and before the ssh tunnel. Does corkscrew support it? If yes, how can I ...

In this question I asked, why the SSH-Host key shown when connecting to a gitlab repository does not match the one shown on the instance configuration page. Nevertheless, the accepted answer says that ...

I am looking to test a DPI (deep packet inspector). I currently have it set up to block SSH connections (which it does successfully). I have learned that DPI can be bypassed by obfuscating/encrypting ...

As far as I understand, bruteforcing ssh is only attempted for passwords, not keys (barring edge cases where presumably the NSA wants to break in). So if a server has disabled (in addition to root ...

According to the end of RFC 4253 ยง 6, the random padding introduced to each SSH packet is an arbitrary multiple of 8. It mentions that random padding lengths can mitigate traffic analysis: Note ...

My workflow involves running Jupyter Notebook on a server, and editing & runnig code from my laptop by connecting using ssh -L to that server. Recently, I made this systemd unit that maintains an ...

Related tags

Hot questions

Language

Popular Tags