hachyderm.io is one of the many independent Mastodon servers you can use to participate in the fediverse.
Hachyderm is a safe space, LGBTQIA+ and BLM, primarily comprised of tech industry professionals world wide. Note that many non-user account types have restrictions - please see our About page.

Administered by:

Server stats:

8.9K
active users

#openssh

6 posts6 participants0 posts today

Non-recommended #OpenSSH tip du jour:

If you have to do as much SSH tunneling as I am doing to investigate this insane network form hell, clearing out the SSH Host Key entries from ~/.ssh/known_hosts gets old fast.

I know I shouldn't do this, but I'm doing it anyways. I've added this to my ~/.ssh/config file:

Host 127.0.0.1
UserKnownHostsFile=/dev/null
StrictHostKeyChecking=no

Essentially, if I am SSH tunneling, i don't store the key, and I don't ask about the key.

Hopefully, I remember to remove this once I finish unfucking this network.

Who else got tripped up by the new security settings in sshd (openssh) recently?

* PerSourcePenalties
* PerSourcePenaltyExemptList

Anyone else notice that Android devices seem to trip these up specifically? Haven't dug into traces yet.

#Linux#ssh#openssh
Continued thread
Fuckit, now is as good a time as any to finally submit that Pull Request to update MacPorts' OpenSSH to 10.0p2 that I had been sitting on hoping for help in improving the MacPorts' patches to ssh-agent.c (making it launchd aware) and sshd-session.c (utilizing macOS's sandbox functionality):

https://github.com/macports/macports-ports/pull/28253

Maybe the GitHub Continuous Integration checks will break there too?

#OpenSSH #MacPorts #OpenBSD #SecureShell #OpenSource #PleasForHelp
closes: https://trac.macports.org/ticket/72317

Description

Type(s)


 bugfix
 enhancement
 security fix

Tested on

macOS 15.4.1 24E263 arm64
Command Line Tools 16.3.0.0.1.1742442376
Verification...
GitHubopenssh: update to 10.0p2 by artkiver · Pull Request #28253 · macports/macports-portsBy artkiver

La décima versión de OpenSSH viene con el algoritmo mlkem768xto25519-sha256 activado por defecto, que se considera seguro ante ataques con ordenadores cuánticos y además se ha convertido en norma en el NIST #openssh -> hardlimit.com/archivo.php?n=22

hardlimit.comPrimera página | Portada HardlimitToda la actualidad del hardware y el software. Visita nuestros foros y comprueba el rendimiento de tu procesador con nuestro banco de pruebas.