#SSH config generator for the lazy smart people.
Wondering if someone forgot to renew their domain at openssh.com as it appears to have recently changed hands and is offline…
That said, since modern versions of #OpenSSH have adopted a post-quantum key exchange by default and #Wireguard isn't, by default at least, totally quantum safe, I wonder if it would be better to use SSH with password login disabled as a VPN instead of Wireguard. You can use the optional PSK option with Wireguard to attain some level of PQ security, but it's not 100% because of the default handshake.
Just thinking out loud.
Forgot to check #OpenSSH 10.1's changelog It was released a few weeks ago and has some interesting features #PQ
* ssh(1): add a warning when the connection negotiates a non-post quantum key agreement algorithm.
This warning has been added due to the risk of "store now, decrypt later" attacks. More details at https://openssh.com/pq.html
This warning may be controlled via a new WarnWeakCrypto ssh_config option, defaulting to on. This option is likely to control additional weak crypto warnings in the future.
Back to basics - Exploring OpenSSH: hands-on workshop for beginners
We'll play & learn with a Docker-based lab you can break and rebuild as much as you want.
Feel free to join tomorrow morning at 10h15 in Vianden & Wiltz
Discourse channel -->
https://discourse.ossbase.org/t/back-to-basics-exploring-openssh-hands-on-workshop-for-beginners-william-robinet/659/2

Can't install openssh-server because of openssh-client conflict #apt #packagemanagement #dependencies #openssh

❯ ssh router
** WARNING: connection is not using a post-quantum key exchange algorithm.
** This session may be vulnerable to "store now, decrypt later" attacks.
** The server may need to be upgraded. See https://openssh.com/pq.html
MMM MMM KKK TTTTTTTTTTT KKK
MMMM MMMM KKK TTTTTTTTTTT KKK
MMM MMMM MMM III KKK KKK RRRRRR OOOOOO TTT III KKK KKK
MMM MM MMM III KKKKK RRR RRR OOO OOO TTT III KKKKK
MMM MMM III KKK KKK RRRRRR OOO OOO TTT III KKK KKK
MMM MMM III KKK KKK RRR RRR OOOOOO TTT III KKK KKK
MikroTik RouterOS 7.19.6 (c) 1999-2025 https://www.mikrotik.com/
Press F1 for help
[root@homerouter] >❯ grep -A4 '^Host router' .ssh/config
Host router
HostName 192.168.1.254
User root
KexAlgorithms +curve25519-sha256,curve25519-sha256@libssh.org
IdentityFile ~/.ssh/router_rsaInstant gratification from reading the OpenSSH release notes:
ssh(1): add a warning when the connection negotiates a non-post quantum key agreement algorithm.
OpenSSH 10.1 is now available, featuring DSCP handling changes, security fixes, and plans to deprecate SHA1 SSHFP.
https://linuxiac.com/openssh-10-1-new-dscp-handling-sha1-sshfp-deprecation-announced/
Anyone got an idea how to do this:
I know how to do most things of this, but not all at once (AuthenticationMethods is permitted in a Match block, but we cannot match on keys, we want access to the same user, and the “self” key can also be used (agent forwarding) from nōn-local addresses.
It seems like I’ll need a custom PAM module (arrrgh, I don’t want to write one of these) that asks for the password if key B is used (does SSH expose this to PAM?).
Anyone got a better idea?
j'ai reçu des mails de gens qui font des audits "c'est cadeau ça me fait plaiz" de mes serveurs pour me dire qu'on peut trouver des infos sur la version de telle ou telle lib, que je devrais changer ma config ssh... de la part de gens chez gmail.
blague à part, il me semblait que pour les configs ssh les paquets debian / ubuntu étaient géré d'une façon suffisamment saine pour qu'on ait pas besoin de faire de config spéciale pour que ça reste aux meilleures normes. ceussent qui sachent, si vous voulez donner un avis c'est bienvenu.
GitHub adds post-quantum protection for SSH access https://www.helpnetsecurity.com/2025/09/16/github-post-quantum-ssh-access/ #quantumcomputing #accesscontrol #encryption #Don'tmiss #OpenSSH #GitHub #News #NIST #SSH
Yes, I would totes put 1000 BTC on a system and have OpenSSH as a frontline software to protect it.
Part 2 in my #hardwarehacking adventures - I've setup a IRC server that runs on the #tenda4G185 MiFi device. It was another fun deep dive into cross compiling, various IRC servers and then using #openssh to make reverse ssh tunnels.
https://projects.solarcene.community/posts/irc_details/index.html
#reverseengineering
#arm
#linux
#travelrouter
#zte
#lowtechcomputing
OpenSSH will now adapt IP QoS to actual sessions and traffic https://www.undeadly.org/cgi?action=article;sid=20250818113047 #openbsd #openssh #ssh #qos #adaptive #networking #security #qualityofservice