Global web icon
stackexchange.com
https://security.stackexchange.com/questions/42239…
What effect has MaxAuthTries=1? - Information Security Stack Exchange
6 I configure a new server right now and ask myself what is the internally effect if I set MaxAuthTries=1 in sshd_config. The server only accept key authentication an no root logins. Has this setting any effect to prevent brute force logins? Is there any effect more than closing the tcp socket after MaxAuthTries wrong authentications?
Global web icon
stackexchange.com
https://security.stackexchange.com/questions/27893…
RHEL in FIPS mode ignores crypto subpolicy
It appears that in FIPS mode, by default, sshd uses hardcoded values for the ciphers, instead of using the values from the crypto policy. In RHEL 9, the back-end file generated by crypto policies is compatible with /etc/ssh/sshd_config, and can be included by adding the following line:
Global web icon
stackexchange.com
https://security.stackexchange.com/questions/25767…
SSH Server Configuration Best Practices? - Information Security Stack ...
I have been tasked with reviewing the settings of an SSH server, I'm currently trying to figure out what are the best practices, and I'm having a bit of trouble finding a good answer. I keep findin...
Global web icon
stackexchange.com
https://security.stackexchange.com/questions/13101…
Which host key algorithm is best to use for SSH?
When you first connect to an SSH server that is not contained inside your known_hosts file your SSH client displays the fingerprint of the public key that the server gave. I found from this questio...
Global web icon
stackexchange.com
https://security.stackexchange.com/questions/22782…
Security Concerns with TCP Forwarding
So, - what is the security threat with allowing TCP Forwarding in SSH and will I get rid of that concern when I add AllowTCPForwarding No to sshd_config or will I additionally have to restrict the shell access or add the no-port-forwarding option?
Global web icon
stackexchange.com
https://security.stackexchange.com/questions/29509…
SSH Bad Protocol Version Identification String- What is it?
This is octal representation (base 8). During the initial steps of a SSH connection, the client and the server send each other the version (s) of the protocol they implement, as strings. These strings must follow a specific format. Here, your server received from the client a "protocol version" string consisting of five bytes, of value 128, 226, 1, 3 and 1, in that order. This is not a ...
Global web icon
stackexchange.com
https://security.stackexchange.com/questions/12476…
What could cause "Bad packet length" with sshd?
What could cause "Bad packet length" with sshd? Ask Question Asked 9 years, 6 months ago Modified 1 year, 10 months ago
Global web icon
stackexchange.com
https://security.stackexchange.com/questions/57777…
Creating port-specific SSH authentication for the same user
2 You could run two ssh daemons listening on separate ports by using two sshd_config files and the -f option of sshd. One configuration file would include the OTP/pam module whilst the other would only allow key-based authentication.. Both would then authenticate the user against their own private key regardless.
Global web icon
stackexchange.com
https://security.stackexchange.com/questions/18036…
Creating user specific authentication methods in SSH
30 I have configured sshd on an Ubuntu server to use key authentication and it is working fine. I had to disable password authentication for key authentication to work. Server is always accessed via remote terminals or putty. Now all user accounts are able to login with the authentication key and passphrase.
Global web icon
stackexchange.com
https://security.stackexchange.com/questions/14470…
ssh-keygen: sshd host key setup - Information Security Stack Exchange
When setting up an sshd daemon and generating a host key with ssh-keygen -A what options are best practice to add? How do I remove keys which may have already been auto-generated with sub-optimal options?