mastodon.xyz is one of the many independent Mastodon servers you can use to participate in the fediverse.
A Mastodon instance, open to everyone, but mainly English and French speaking.

Administered by:

Server stats:

812
active users

#ssh

9 posts9 participants0 posts today
Daniel Wayne Armstrong<p>Disable password logins on the SERVER in favour of using SSH keys for authentication. Create the necessary SSH keys on a NetBSD CLIENT that will be used to secure access to remote devices:</p><p><a href="https://www.dwarmstrong.org/netbsd-ssh-keys/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">dwarmstrong.org/netbsd-ssh-key</span><span class="invisible">s/</span></a></p><p><a href="https://fosstodon.org/tags/SSH" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SSH</span></a> <a href="https://fosstodon.org/tags/NetBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NetBSD</span></a> <a href="https://fosstodon.org/tags/RunBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RunBSD</span></a> <a href="https://fosstodon.org/tags/Encryption" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Encryption</span></a></p>
Alexandre Dulaunoy<p>we talk about ssh with <span class="h-card" translate="no"><a href="https://infosec.exchange/@jtk" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>jtk</span></a></span> and bam there is this</p><p><a href="https://vulnerability.circl.lu/vuln/CVE-2025-32433#sightings" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">vulnerability.circl.lu/vuln/CV</span><span class="invisible">E-2025-32433#sightings</span></a></p><p>“SSH server (Erlang) may allow an attacker to perform unauthenticated remote code execution (RCE).”</p><p>We should be careful when we talk.</p><p><a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerability</span></a> <a href="https://infosec.exchange/tags/ssh" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ssh</span></a> <a href="https://infosec.exchange/tags/erlang" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>erlang</span></a></p>
xyhhx 🔻 (plz hire me)<p>in a totally unsurprising turn of events, working on software for my onlykey is forcing me to learn lots of details about pgp/gpg, ssh, their agents, and all the fido2/ctap stuff</p><p>it's cool though</p><p><a href="https://nso.group/tags/onlyKey" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>onlyKey</span></a> <a href="https://nso.group/tags/GPG" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GPG</span></a> <a href="https://nso.group/tags/SSH" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SSH</span></a> <a href="https://nso.group/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://nso.group/tags/cryptography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptography</span></a></p>
Royce Williams<p>Call for volunteer data:</p><p>Looking for real sets of hash-protected ssh <code>~/.ssh/known_hosts</code> files/records, to tune cracking attack stacks on. The bigger the better.</p><p>Requirements: the cipher type and the fingerprint are not needed -- just need the hash and salt (first couple of base64 fields). </p><p>Individual cracks won't be published. If you want your own cracks, strong proof of ownership required. DM me!</p><p><a href="https://infosec.exchange/tags/ssh" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ssh</span></a> <a href="https://infosec.exchange/tags/HashCracking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HashCracking</span></a></p>
Marcus Rohrmoser 🌻<p>📄 <a href="https://digitalcourage.social/tags/Permacomputing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Permacomputing</span></a> Praxis: Website Monitoring | MRo Blog<br><a href="https://blog.mro.name/2025/04/permacomputing-praxis-website-monitoring/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.mro.name/2025/04/permacom</span><span class="invisible">puting-praxis-website-monitoring/</span></a><br><a href="https://digitalcourage.social/tags/HTTP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HTTP</span></a> <a href="https://digitalcourage.social/tags/Monitor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Monitor</span></a> <a href="https://digitalcourage.social/tags/curl" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>curl</span></a> <a href="https://digitalcourage.social/tags/cron" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cron</span></a> <a href="https://digitalcourage.social/tags/ssh" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ssh</span></a> <a href="https://digitalcourage.social/tags/konvivial" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>konvivial</span></a><br>¹ <a href="https://mro.name/b5527a7" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">mro.name/b5527a7</span><span class="invisible"></span></a></p>
Billie<p>I have an old <a href="https://social.tchncs.de/tags/asus" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>asus</span></a> where the <a href="https://social.tchncs.de/tags/pciex16" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pciex16</span></a> obviously died. </p><p>Any graphics card I put into the <a href="https://social.tchncs.de/tags/pciex16" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pciex16</span></a> slot makes it crash and prevents it from booting. I also do not get any graphics output at all at boot.</p><p>However, I can access the pc <a href="https://social.tchncs.de/tags/headless" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>headless</span></a> via <a href="https://social.tchncs.de/tags/ssh" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ssh</span></a> . It has <a href="https://social.tchncs.de/tags/ubuntu" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ubuntu</span></a> server installed.</p><p>Is there any chance to connect this to any modern monitor having D-SUB, so that I can at least access the <a href="https://social.tchncs.de/tags/bios" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bios</span></a> or set up something non-headless ?</p><p>It has a 350 W power supply, so that is probably not the issue.</p>
Imogen<p><a href="https://mstdn.social/tags/Technology" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Technology</span></a> <a href="https://mstdn.social/tags/Computers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Computers</span></a> <a href="https://mstdn.social/tags/UNIX" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>UNIX</span></a> <a href="https://mstdn.social/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a> <a href="https://mstdn.social/tags/SSH" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SSH</span></a> </p><p>Have you upgraded to OpenSSH 10?</p>
tunda<p>Eingefrohrende SSH-Sessions kann man durch das Drücken von "Enter, Tilde und Punkt" beenden. </p><p><a href="https://layer8.space/tags/ssh" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ssh</span></a></p>
Ben S.<p>In case anyone is wondering why <a href="https://mastodon.sdf.org/tags/ssh" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ssh</span></a> (<a href="https://mastodon.sdf.org/tags/openssh" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>openssh</span></a>) is failing silently on <a href="https://mastodon.sdf.org/tags/msys2" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>msys2</span></a> - seems they pushed out a version that depends on an msys2 runtime version that's stuck in some kind of release queue: <a href="https://github.com/msys2/MSYS2-packages/issues/5320" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/msys2/MSYS2-package</span><span class="invisible">s/issues/5320</span></a></p>
Iain Cuthbertson<p>For your personal system hopping and coding - how many <a href="https://mendeddrum.org/tags/SSH" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SSH</span></a> keys do you use?</p>
Edwin G. :mapleleafroundel:<p>Portable OpenSSH 10.0p1 will not exist. It will be known as OpenSSH 10.0p2.</p><p><a href="https://lists.mindrot.org/pipermail/openssh-unix-announce/2025-April/000163.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">lists.mindrot.org/pipermail/op</span><span class="invisible">enssh-unix-announce/2025-April/000163.html</span></a><br>- - -<br>OpenSSH portable 10.0p1 n’existera pas. Ce sera connue comme OpenSSH 10.0p2. </p><p>// Publication en anglais //</p><p><a href="https://mstdn.moimeme.ca/tags/OpenSSH" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenSSH</span></a> <a href="https://mstdn.moimeme.ca/tags/SSH" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SSH</span></a></p>
Senioradmin<p><a href="https://social.tchncs.de/tags/OpenSSH" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenSSH</span></a> 9.8 und höher kommt allmählich auf die Server. Da wird die Option PerSourcePenalties interessant (siehe <a href="https://undeadly.org/cgi?action=article;sid=20240607042157" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">undeadly.org/cgi?action=articl</span><span class="invisible">e;sid=20240607042157</span></a> ) die fail2ban u.ä. überflüssig machen könnte.</p><p>Konfig-Beispiele sind aber noch rar gesät. Nach der manpage zu urteilen, sollte aber </p><p>PerSourcePenalties authfail:3600s</p><p>dafür sorgen dass IPs, die Brute-Force Attacken fahren für 1 Stunde geblockt werden, korrekt? </p><p><a href="https://social.tchncs.de/tags/SSH" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SSH</span></a></p>
Peter N. M. Hansteen<p>OpenSSH 10.0 Released <a href="https://www.undeadly.org/cgi?action=article;sid=20250410053152" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">undeadly.org/cgi?action=articl</span><span class="invisible">e;sid=20250410053152</span></a> <a href="https://mastodon.social/tags/openbsd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>openbsd</span></a> <a href="https://mastodon.social/tags/openssh" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>openssh</span></a> <a href="https://mastodon.social/tags/ssh" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ssh</span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://mastodon.social/tags/networking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>networking</span></a> <a href="https://mastodon.social/tags/development" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>development</span></a> <a href="https://mastodon.social/tags/newrelease" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>newrelease</span></a> <a href="https://mastodon.social/tags/devops" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>devops</span></a> <a href="https://mastodon.social/tags/sysadmin" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sysadmin</span></a> <a href="https://mastodon.social/tags/freesoftware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>freesoftware</span></a> <a href="https://mastodon.social/tags/libresoftware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>libresoftware</span></a></p>
OpenBSD Now!<p>Alert when users log in from new locations </p><p><a href="https://github.com/mricon/howler" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="">github.com/mricon/howler</span><span class="invisible"></span></a></p><p><a href="https://bsd.network/tags/ssh" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ssh</span></a> <a href="https://bsd.network/tags/sec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sec</span></a></p>
Linuxiac<p>OpenSSH 10 is out now, featuring stronger cryptographic defaults, new post-quantum key exchange, and key security improvements across the board.<br><a href="https://linuxiac.com/openssh-10-released-makes-bold-cryptographic-changes/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">linuxiac.com/openssh-10-releas</span><span class="invisible">ed-makes-bold-cryptographic-changes/</span></a></p><p><a href="https://mastodon.social/tags/ssh" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ssh</span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://mastodon.social/tags/opensource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opensource</span></a></p>
heise online English<p>OpenSSH 10 relies on standards for quantum-safe key exchange</p><p>The DSA algorithm, which has been discontinued for years, is now disappearing completely from the secure remote shell, to be replaced by MLKEM768.</p><p><a href="https://www.heise.de/en/news/OpenSSH-10-relies-on-standards-for-quantum-safe-key-exchange-10346176.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/en/news/OpenSSH-10-re</span><span class="invisible">lies-on-standards-for-quantum-safe-key-exchange-10346176.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/NIST" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NIST</span></a> <a href="https://social.heise.de/tags/Verschl%C3%BCsselung" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Verschlüsselung</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/SSH" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SSH</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
heise Security<p>OpenSSH 10 setzt auf Standards für quantensicheren Schlüsselaustausch</p><p>Der seit Jahren abgekündigte DSA-Algorithmus verschwindet nun vollständig aus der sicheren Remote-Shell, seine Nachfolge tritt MLKEM768 an.</p><p><a href="https://www.heise.de/news/OpenSSH-10-setzt-auf-Standards-fuer-quantensicheren-Schluesselaustausch-10345975.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/OpenSSH-10-setzt</span><span class="invisible">-auf-Standards-fuer-quantensicheren-Schluesselaustausch-10345975.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/NIST" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NIST</span></a> <a href="https://social.heise.de/tags/Verschl%C3%BCsselung" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Verschlüsselung</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/SSH" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SSH</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
Oliver<p>Me: <br>* opens new browser tab<br>* starts typing " <a href="https://lfnt.site/tags/ssh" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ssh</span></a> hostname.tld"</p><p>Oh.. so it's gonna be that kind of a day.. 😂 </p><p><a href="https://lfnt.site/tags/sysadmin" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sysadmin</span></a></p>
ax6761<p>Right.</p><p>I logged onto a remote host from one 'puter with "ssh -J jump-station remote-host".</p><p>When went to log from another 'puter later, was surprised to find that I would need to supply the credentials for "remote-host" again. "Again" for I am using "Control*" (see "ssh_config(5)" manual page) so was thinking "jump-station" would already have the socket set up for "remote-host".</p><p>No, those "Control*" sockets are created on local 'puter. So needed to supply the credentials.</p><p><a href="https://freeradical.zone/tags/SSH" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SSH</span></a></p>
Burak Gürsoy<p>passwordless <a href="https://gursoy.social/tags/ssh" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ssh</span></a> </p><p><a href="https://www.strongdm.com/blog/ssh-passwordless-login" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">strongdm.com/blog/ssh-password</span><span class="invisible">less-login</span></a></p>