#SecureShell

2026-02-05

Error triggered during SSH hardening? No worries! This guide explains how to fix fail2Ban startup error on Debian Linux 13 step by step.

Step-by-Step Tutorial: ostechnix.com/fail2ban-startup

#SSH #SecureShell #Debian #Troubleshooting #Linux

2026-01-29

SecureShell là lớp bảo mật plug-and-play cho các agent LLM. Chặn lệnh nguy hiểm, phân loại rủi ro (an toàn/đáng ngờ/nguy hiểm), tương thích đa nền tảng (Linux, macOS, Windows). Cài đặt dễ dàng qua pip hoặc npm. Dành cho: nhà phát triển agent, team dùng LangChain/MCP, ai lo ngại injection. #SecureShell #LLM #Python #JavaScript #AI #AnToanHeThong #BảoMật #AgentAI #MáyTính #DevOps #Security #TechNews #CôngNghệ #LậpTrình #OpenSource

reddit.com/r/LocalLLaMA/commen

2026-01-24

Learn how to install, configure, and secure SSH on Debian 13. Complete guide with SSH keys, firewall setup, and fail2ban protection.

Step-by-Step tutorial: ostechnix.com/set-up-configure

#SSH #SecureShell #Debian13 #Linux #Security #SSHHardening #Linuxadmin #Linuxhowto #Fail2ban #UFW #Firewall

Negative PID Inc.negativepid
2026-01-03

SSH (Secure Shell) is one of the most useful tools in the toolbox of the system administrator. Used to connect to servers, computers, virtual machines, Docker containers, and more, this authentication method is fast, efficient, and secure. Here's how it works and how to get started.

negativepid.blog/an-introducti
negativepid.blog/an-introducti

Negative PID Inc.negativepid
2025-12-18

SSH (Secure Shell) is one of the most useful tools in the toolbox of the system administrator. Used to connect to servers, computers, virtual machines, Docker containers, and more, this authentication method is fast, efficient, and secure. Here's how it works and how to get started.

negativepid.blog/an-introducti
negativepid.blog/an-introducti

2025-12-08

Cheatsheet: Configure and enable SSH on FreeBSD
#Freebsd #BSD #Unix #SSH #SecureShell

Cheatsheet: Configure and enable SSH on FreeBSD
2025-12-08

Learn how to configure and enable SSH on FreeBSD 15 to access it from other remote systems on the network.

Step-by-Step: ostechnix.com/how-to-enable-ss

#Freebsd15 #BSD #Unix #SSH #SecureShell

Negative PID Inc.negativepid
2025-12-04

SSH (Secure Shell) is one of the most useful tools in the toolbox of the system administrator. Used to connect to servers, computers, virtual machines, Docker containers, and more, this authentication method is fast, efficient, and secure. Here's how it works and how to get started.

negativepid.blog/an-introducti
negativepid.blog/an-introducti

2025-11-26

Secure Shell is an essential tool for remote system administration. Learn how to set up and configure SSH on Fedora Linux 43.

Step-by-Step Guide: ostechnix.com/set-up-configure

#SSH #SecureShell #Fedora43 #Linux #Linuxadmin #Linuxhowto

Negative PID Inc.negativepid
2025-11-15

SSH (Secure Shell) is one of the most useful tools in the toolbox of the system administrator. Used to connect to servers, computers, virtual machines, Docker containers, and more, this authentication method is fast, efficient, and secure. Here's how it works and how to get started.

negativepid.blog/an-introducti
negativepid.blog/an-introducti

Negative PID Inc.negativepid
2025-11-03

SSH (Secure Shell) is one of the most useful tools in the toolbox of the system administrator. Used to connect to servers, computers, virtual machines, Docker containers, and more, this authentication method is fast, efficient, and secure. Here's how it works and how to get started.

negativepid.blog/an-introducti
negativepid.blog/an-introducti

Negative PID Inc.negativepid
2025-11-01

SSH (Secure Shell) is one of the most useful tools in the toolbox of the system administrator. Used to connect to servers, computers, virtual machines, Docker containers, and more, this authentication method is fast, efficient, and secure. Here's how it works and how to get started.

negativepid.blog/an-introducti
negativepid.blog/an-introducti

Josh Leeitsjoshlee_
2025-10-21

A client once left SSH wide open on their servers because “we just needed quick access.”
Within weeks, their logs showed thousands of random connection attempts from around the world.
That’s what happens when your bouncer lets everyone into the club.
Lock your security groups down to trusted IPs, use a VPN for remote access, and run regular audits. The internet doesn’t need a spare key to your servers.

Negative PID Inc.negativepid
2025-10-16

SSH (Secure Shell) is one of the most useful tools in the toolbox of the system administrator. Used to connect to servers, computers, virtual machines, Docker containers, and more, this authentication method is fast, efficient, and secure. Here's how it works and how to get started.

negativepid.blog/an-introducti
negativepid.blog/an-introducti

ティージェーグレェteajaygrey@snac.bsd.cafe
2025-10-06
I submitted a Pull Request to update MacPorts' OpenSSH to 10.1p1 here:

https://github.com/macports/macports-ports/pull/28592

GitHub Continuous Integration checks passed OK!

Alas, the agent.patch that iamGavinJ had created, doesn't apply cleanly, in large part because ssh-agent.c has been reworked significantly with this release.

Subsequently, I closed this previous Pull Request: https://github.com/macports/macports-ports/pull/28592 not because I didn't want to restore that functionality to launchd, but because it will require more effort than I can give such things at this time.

But, check out these improvements to ssh-agent from the OpenSSH 10.1 release notes:

"ssh-agent(1)](https://man.openbsd.org/ssh-agent.1), sshd(8): move agent listener sockets from /tmp to
under ~/.ssh/agent for both ssh-agent(1) and forwarded sockets
in sshd(8).

This ensures processes that have restricted filesystem access
that includes /tmp do not ambiently have the ability to use keys
in an agent.

Moving the default directory has the consequence that the OS will
no longer clean up stale agent sockets, so ssh-agent now gains
this ability.

To support $HOME on NFS, the socket path includes a truncated
hash of the hostname. ssh-agent will, by default, only clean up
sockets from the same hostname.

ssh-agent(1) gains some new flags: -U suppresses the automatic
cleanup of stale sockets when it starts. -u forces a cleanup
without keeping a running agent, -uu forces a cleanup that ignores
the hostname. -T makes ssh-agent put the socket back in /tmp."

Anyway, I updated this as well:

https://trac.macports.org/ticket/72482

I should probably actually close this ticket now that I think of it (fingers crossed that adding that to the PR is sufficient, since I forgot to add that note to the commit message as is typically preferred: https://trac.macports.org/ticket/73084).

#OpenSSH #MacPorts #SecureShell #macOS #encryption #security #infosec
Hacker Newsh4ckernews
2025-09-27
James Trickle uPopalmirror@hachyderm.io
2025-06-02

I have been having Secure Shell hangs when sending/receiving bulk data (large packets) between my workstation and a WAN server. I think I've discovered bad behavior somewhere in the WAN.

I figured it out by pinging the remote host using different sized packets with the Do Not Fragment bit set. Above a certain size, one is supposed to go from receiving ping responses to getting back ICMP error packets indicating the packet was too large and that fragmentation is needed, along with the MTU size to use. This called Path MTU Discovery.

Instead of that I get three behaviors: ping response for small packets, silence for midsized packets (bad!), and error response for too-large packets.

This is really bad news, and it seems TCP just stops working if it can't get those too-large packets through.

Anyway, the WAN provider apparently autonomously rebooted their equipment, and the problem is now gone, but it has been dogging me intermittently the last several months. It's a real pain when ssh craps out when cat'ing a long file or git fetch sessions hang.

I now have the start of a tool that I can use to monitor that bad behavior is happening, though.

#networking #IP #Internet #MTU #whine #software #WAN #SecureShell #ICMP #routing

Dendrobatus AzureusDendrobatus_Azureus@bsd.cafe
2025-05-07

An unimportant remnant of the past has been removed from open SSH;
DSA.

Read about it in this article the next article linked will show you that it has been removed finally

#SSH #openSSH #DSA #programming #coding #OpenSource #openBSD #BSD #secureShell #Infosec

undeadly.org/cgi?action=articl

The image shows a screenshot of a webpage from the OpenBSD Journal. The top of the page features a black background with a logo on the left, depicting a cartoonish sun with guns, and the text "OpenBSD Journal" in light blue. Below the logo, navigation links are visible: Home, Archives, About, Submit, Story, Create Account, and Login.

The main content of the page is a news article titled "DSA removal from OpenSSH" in large, light blue text. The article was contributed by "rueda" on January 11, 2024, from the "going-dept." The article states that the OpenSSH project has announced the timeline for the removal of DSA support from OpenSSH. It mentions that OpenSSH plans to remove support for DSA, as specified in the SSHv2 protocol, which is limited to a 160-bit private key with an estimated security level of less than or equal to 80 bits. The article also notes that OpenSSH has disabled DSA keys by default and that DSA is optional support for them.

The bottom of the page shows the URL "undeady.org/cgi?act" and a navigation bar with three vertical lines, a home icon, a back arrow, and a menu icon. The battery icon in the top right corner indicates 82% battery life, and the time is 03:31.

 Ovis2-8B

🌱 Energy used: 0.353 Wh

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst