Questions tagged [openssh]

A free and open implementation of the SSH communication security tools.

A free and open implementation of the SSH communication security tools.

Related reading

157 questions
239
votes
3 answers

What are ssh-keygen best practices?

Most users would simply type ssh-keygen and accept what they're given by default. But what are the best practices for generating ssh keys with ssh-keygen? For example: Use -o for the OpenSSH key format rather than the older PEM format (OpenSSH 6.5…
Tom Hale
  • 2,545
  • 3
  • 9
  • 11
88
votes
3 answers

Why OpenSSH deprecated DSA keys

There was a question RSA vs. DSA for SSH authentication keys asking which key is better. Basically all answers were more in a favour of RSA over DSA but didn't really tell that DSA would be somehow insecure. Now however DSA was deprecated by OpenSSH…
Petr
  • 990
  • 1
  • 7
  • 6
26
votes
4 answers

What is the difference between PEM format to DSA/RSA/ECC? (Might I confuse PEM with these)?

When one creates an ECC SSH key for example, this command can be used: ssh-keygen -o -a 100 -t ed25519 As I understand, the -o argument is used to generate: The private keys using a newer format opposed to the more commonly accepted PEM Are…
user123574
25
votes
2 answers

How exploitable is the recent UseRoaming SSH vulnerability?

I recently heard about a serious bug in an OpenSSH client (CVE-2016-0777 and CVE-2016-0778) that if I understood correctly could cause remote code execution. How difficult would be for an active man-in-the-middle to exploit that?
d33tah
  • 6,524
  • 8
  • 38
  • 60
19
votes
2 answers

Is it considered worth it to replace OpenSSH's moduli file?

Consequences of tampered /etc/ssh/moduli describes a possible risk if the moduli file for an OpenSSH server has been tampered with. Taking the logic a step further, is there any concern with the default file shipped with OpenSSH? I ask because the…
evaryont
  • 335
  • 1
  • 2
  • 6
18
votes
2 answers

OpenSSH declares ssh-rsa deprecated. What do I do next?

With the 8.2 release of OpenSSH, they have declared that ssh-rsa for SHA-1 will soon be removed from the defaults: Future deprecation notice It is now possible[1] to perform chosen-prefix attacks against the SHA-1 hash algorithm for less than…
Michael
  • 2,391
  • 2
  • 19
  • 36
17
votes
2 answers

Are there any risks associated with SSH agent forwarding?

I just realized that I need SSH agent forwarding in order to push to one Git server that then forwards the commits to Github.com. I never used SSH agent forwarding and don't understand the security implications of enabling this feature. Do I have to…
d33tah
  • 6,524
  • 8
  • 38
  • 60
12
votes
2 answers

Is there a list of weak SSH ciphers?

Is there a site, which provides a list of weak cipher suites for (Open-)SSH? I know for example that arcfour is not recommended, but there is a whole list of other cipher suites offered, where I am not quite sure.
skipper
  • 121
  • 1
  • 1
  • 3
11
votes
5 answers

Copy SSH Public Key from Windows to Ubuntu

I am trying to get my ssh public key from my windows client to ubuntu host, but I have no idea how to. I tried to find the authorized_keys file, but had zero success. ssh-copy-id command did not work from windows. I generated the public/private key…
user15791
  • 125
  • 1
  • 1
  • 4
10
votes
1 answer

Does it weaken the encryption of SSH to use compression?

When using compression on openssh (a la ssh -C ...), does this reduce entropy and make the tunnel traffic more vulnerable to cryptanalysis? Is compression an option I should disable server-side for this or any other reason? I have a vague…
TopherIsSwell
  • 371
  • 1
  • 14
9
votes
2 answers

Hardening SSH security on a Debian 9 server

I am running the following version of GNU/Linux Debian: cat /etc/issue says: Debian GNU/Linux 9 Using the following kernel: uname -r says: 4.9.0-2-amd64 And running the following version of OpenSSH: apt-cache policy openssh-server | grep…
LinuxSecurityFreak
  • 1,562
  • 2
  • 18
  • 32
9
votes
1 answer

Which ssh exploit works by changing the user name in the middle of the process?

Every few hours, I get a few of those in my server logs: sshd[...]: Disconnecting: Change of username or service not allowed: (httpd,ssh-connection) -> (http,ssh-connection) [preauth] sshd[...]: Disconnecting: Change of username or service not…
Heinzi
  • 2,914
  • 2
  • 21
  • 25
8
votes
2 answers

Why does a SSH server need a host key-pair?

I know that the client needs a client key-pair for client authentication; Clients sends its public key to the Server for it to encrypt a challenge which will be decrypted by the Client to authenticate the Client. I also know that before…
StevenDaGee
  • 83
  • 1
  • 3
8
votes
1 answer

Why does the result of ssh-keyscan -H contain a header line with the un-hashed server ID?

I'm attempting to build a global known_hosts file for my AWS VPC, and was looking at using ssh-keyscan to acquire the fingerprints of new servers as they are created. The -H option seems sensible, as it means you do not reveal identifying…
IBam
  • 265
  • 2
  • 8
7
votes
2 answers

Any Alternative to Ngrok for constant Connection?

Im trying to build RAT to test on my computer. I use ngrok for hacking on WAN. But ngrok has a problem of changing its subdomain once the connection is reset. So, I cant use ngrok for hacking over WAN. I tried using ngrok sub-domain, but now it has…
Adithyan AK
  • 79
  • 1
  • 1
  • 2
1
2 3
10 11