Public SSH keys can leak your private infrastructure | Artem Golubin
https://rushter.com/blog/public-ssh-keys/
#ssh #security
  
  https://rushter.com/blog/public-ssh-keys/
#ssh #security
Artem Golubin
  
  Public SSH keys can leak your private infrastructure | Artem Golubin
  An article about a small security flaw in the SSH authentication protocol that can lead to unexpected information disclosure of private infrastructure.
  Forwarded from Записки админа
🔏 Неплохая инструкция о том, как настроить авторизацию по SSH с использованием системы единого входа (SSO) от Google: https://sysadmin.pm/sso-ssh
📗 А по ссылке далее, уже моя давняя заметка о том, как защитить SSH соединение с помощью 2fa: https://sysadmin.pm/ssh-google-authenticator/
#ssh #напочитать #security
  📗 А по ссылке далее, уже моя давняя заметка о том, как защитить SSH соединение с помощью 2fa: https://sysadmin.pm/ssh-google-authenticator/
#ssh #напочитать #security
Bypass your Linux firewall with SSH over HTTP | Opensource.com
https://opensource.com/article/20/7/linux-shellhub
#ssh #remote #service
  
  https://opensource.com/article/20/7/linux-shellhub
#ssh #remote #service
Opensource.com
  
  Bypass your Linux firewall with SSH over HTTP
  With the growth of connectivity and remote jobs, accessing remote computing resources becomes more important every day.
  An analysis of the OpenSSHfingerprint visualization algorithm
http://www.dirk-loss.de/sshvis/drunken_bishop.pdf
#ssh #visualization
  http://www.dirk-loss.de/sshvis/drunken_bishop.pdf
#ssh #visualization
**visual guide to SSH tunnels**
This page explains use cases and examples of SSH tunnels while visually presenting the traffic flows.
https://robotmoon.com/ssh-tunnels/
#ssh #tunneling
  This page explains use cases and examples of SSH tunnels while visually presenting the traffic flows.
https://robotmoon.com/ssh-tunnels/
#ssh #tunneling