Public SSH keys can leak your private infrastructure | Artem Golubin
https://rushter.com/blog/public-ssh-keys/
#ssh #security
https://rushter.com/blog/public-ssh-keys/
#ssh #security
Artem Golubin
Public SSH keys can leak your private infrastructure | Artem Golubin
An article about a small security flaw in the SSH authentication protocol that can lead to unexpected information disclosure of private infrastructure.
Forwarded from Записки админа
🔏 Неплохая инструкция о том, как настроить авторизацию по SSH с использованием системы единого входа (SSO) от Google: https://sysadmin.pm/sso-ssh
📗 А по ссылке далее, уже моя давняя заметка о том, как защитить SSH соединение с помощью 2fa: https://sysadmin.pm/ssh-google-authenticator/
#ssh #напочитать #security
📗 А по ссылке далее, уже моя давняя заметка о том, как защитить SSH соединение с помощью 2fa: https://sysadmin.pm/ssh-google-authenticator/
#ssh #напочитать #security
Bypass your Linux firewall with SSH over HTTP | Opensource.com
https://opensource.com/article/20/7/linux-shellhub
#ssh #remote #service
https://opensource.com/article/20/7/linux-shellhub
#ssh #remote #service
Opensource.com
Bypass your Linux firewall with SSH over HTTP
With the growth of connectivity and remote jobs, accessing remote computing resources becomes more important every day.
An analysis of the OpenSSHfingerprint visualization algorithm
http://www.dirk-loss.de/sshvis/drunken_bishop.pdf
#ssh #visualization
http://www.dirk-loss.de/sshvis/drunken_bishop.pdf
#ssh #visualization
**visual guide to SSH tunnels**
This page explains use cases and examples of SSH tunnels while visually presenting the traffic flows.
https://robotmoon.com/ssh-tunnels/
#ssh #tunneling
This page explains use cases and examples of SSH tunnels while visually presenting the traffic flows.
https://robotmoon.com/ssh-tunnels/
#ssh #tunneling