SSH Archives - Experiencing Technology https://blog.tinned-software.net/tag/ssh/ Tinned-Software Blog Mon, 09 Apr 2018 17:12:11 +0000 en-US hourly 1 https://wordpress.org/?v=6.5.4 Testing environment setup using Vagrant https://blog.tinned-software.net/testing-environment-setup-using-vagrant/ Mon, 11 Sep 2017 19:37:48 +0000 https://blog.tinned-software.net/?p=2449 Setting up a test environment with many different operating systems and versions can be a time consuming task. Installing the different operating systems and configuring them for tests or development can take up a lot of time. Vagrant makes this … Continue reading

The post Testing environment setup using Vagrant appeared first on Experiencing Technology.

]]>
Verifying SSH configuration with a scan https://blog.tinned-software.net/verifying-ssh-configuration-with-a-scan/ Mon, 23 Jan 2017 10:20:04 +0000 https://blog.tinned-software.net/?p=2281 Managing a number of Linux servers and keeping them secure can be a challenge. Certain tools can make the life of an admin a lot easier. To ensure an ssh daemon complies with a desired security configuration the admin can use a scanner … Continue reading

The post Verifying SSH configuration with a scan appeared first on Experiencing Technology.

]]>
Debug SSH Connection issue in key exchange https://blog.tinned-software.net/debug-ssh-connection-issue-in-key-exchange/ Mon, 02 Jan 2017 09:41:21 +0000 https://blog.tinned-software.net/?p=2284 Securing a server means hardening the SSH server settings, but doing so can also cause issues with ssh clients. Finding the cipher or algorithm causing a failled connection can be tricky. Depending on the client used, the error message might be very … Continue reading

The post Debug SSH Connection issue in key exchange appeared first on Experiencing Technology.

]]>
Harden SSH server settings https://blog.tinned-software.net/harden-ssh-server-settings/ Mon, 31 Oct 2016 08:17:09 +0000 https://blog.tinned-software.net/?p=2279 Many Linux Administrators use ssh on a daily basis. Many of the ssh servers are in their default configuration. Not changing the default configuration puts the security of the server at risk. That is why it is important to follow a few … Continue reading

The post Harden SSH server settings appeared first on Experiencing Technology.

]]>
Manage SSH-keys with the SSH-agent https://blog.tinned-software.net/manage-ssh-keys-with-the-ssh-agent/ Mon, 08 Aug 2016 09:01:33 +0000 https://blog.tinned-software.net/?p=2176 Many webservices generate ssh keys to access their service. With the amount of services the number of SSH keys grows. To avoid dealing with the keys in the command line and the ssh_config(5), you can simply add the ssh-key to the … Continue reading

The post Manage SSH-keys with the SSH-agent appeared first on Experiencing Technology.

]]>
Restrict SSH access to port forwarding to one specific port https://blog.tinned-software.net/restrict-ssh-access-to-port-forwarding-to-one-specific-port/ Tue, 01 Mar 2016 18:49:19 +0000 http://blog.tinned-software.net/?p=2083 Allowing access to an unprotected service on a server is always a problem. Sometimes the easiest way is to not expose this service to the network but allow access via ssh port-forwarding, but how to limit the SSH account to … Continue reading

The post Restrict SSH access to port forwarding to one specific port appeared first on Experiencing Technology.

]]>
Generate public SSH key from private SSH key https://blog.tinned-software.net/generate-public-ssh-key-from-private-ssh-key/ Mon, 15 Feb 2016 18:32:20 +0000 http://blog.tinned-software.net/?p=1987 A lost SSH public-key or a web service generates an SSH key but does not provide the public-key part to you. What to do now? There is a solution for this situation. Continue reading

The post Generate public SSH key from private SSH key appeared first on Experiencing Technology.

]]>
Managing shell commands and processes https://blog.tinned-software.net/managing-shell-commands-and-processes/ Mon, 18 Jan 2016 16:32:17 +0000 http://blog.tinned-software.net/?p=1828 Not every command you might execute only runs for a couple of seconds. When you have a long running command a couple of problems can come with it. When the ssh connection is not stable, the command might be interrupted, … Continue reading

The post Managing shell commands and processes appeared first on Experiencing Technology.

]]>
Gitosis Arguments to command look dangerous https://blog.tinned-software.net/gitosis-arguments-to-command-look-dangerous/ Mon, 23 Nov 2015 17:54:14 +0000 http://blog.tinned-software.net/?p=2014 Dealing with non-English languages, you might come across a couple of issues caused by special characters. Even gitosis has its limitations in this area. One of the error messages caused by special characters is: “Arguments to command look dangerous”. When a … Continue reading

The post Gitosis Arguments to command look dangerous appeared first on Experiencing Technology.

]]>
Gitosis Unsafe SSH username in keyfile https://blog.tinned-software.net/gitosis-unsafe-ssh-username-in-keyfile/ Mon, 12 Oct 2015 17:39:37 +0000 http://blog.tinned-software.net/?p=2010 While configuring and using Gitosis you will probably see the following error sooner or later. This error will appear immediately when changed configuration is pushed to the gitosis-admin repository. With this error, the reported user keys are not provisioned properly … Continue reading

The post Gitosis Unsafe SSH username in keyfile appeared first on Experiencing Technology.

]]>
Use ssh comfortably with command history and auto-complete https://blog.tinned-software.net/use-ssh-comfortably-with-command-history-and-auto-complete/ Mon, 27 Apr 2015 18:19:49 +0000 http://blog.tinned-software.net/?p=1400 When using ssh on a daily basis you type a lot, given you are probably entering a lot of hostnames and command-line options. But on your local Linux or OS X powered computer you have a lot of powerful tools to make your life easier. I would like to show a couple of easy tricks to make your life easier while working with ssh. Continue reading

The post Use ssh comfortably with command history and auto-complete appeared first on Experiencing Technology.

]]>
SSH-Key authentication is not working – SELinux https://blog.tinned-software.net/ssh-key-authentication-is-not-working-selinux/ https://blog.tinned-software.net/ssh-key-authentication-is-not-working-selinux/#comments Mon, 05 Jan 2015 13:44:32 +0000 http://blog.tinned-software.net/?p=1414 When configuring SSH passwordless login with ssh-key the ssh-key generated and transfered to the server seems to not work when I try to login. Whay is the ssh-key authentication failing? Continue reading

The post SSH-Key authentication is not working – SELinux appeared first on Experiencing Technology.

]]>
https://blog.tinned-software.net/ssh-key-authentication-is-not-working-selinux/feed/ 1
Create webupload user for SCP https://blog.tinned-software.net/create-webupload-user-for-scp/ Fri, 15 Aug 2014 19:41:45 +0000 http://blog.tinned-software.net/?p=1542 With a website running on your server you might have come across the permission problems when uploading files to the document root. Files are owned by the upload user, apache can read them but upload and modification via the web front-end fails and much more. The reason is the permission and ownership structure in Linux. But how to solve that mess? Continue reading

The post Create webupload user for SCP appeared first on Experiencing Technology.

]]>
Access SSH server without direct connection from the internet https://blog.tinned-software.net/access-ssh-server-without-direct-connection-from-the-internet/ https://blog.tinned-software.net/access-ssh-server-without-direct-connection-from-the-internet/#comments Sat, 17 May 2014 21:06:07 +0000 http://blog.tinned-software.net/?p=1495 When two servers are connected to each other but only one server has access to the internet, it is always uncomfortable to connect to the server without internet connection. Specially when files need to be copied to the server without direct internet connection. There is a way to make it more comfortable to connect via ssh. Continue reading

The post Access SSH server without direct connection from the internet appeared first on Experiencing Technology.

]]>
https://blog.tinned-software.net/access-ssh-server-without-direct-connection-from-the-internet/feed/ 1
Restrict SSH login using SSH keys to a particular IP address https://blog.tinned-software.net/restrict-ssh-logins-using-ssh-keys-to-a-particular-ip-address/ Tue, 18 Mar 2014 09:40:24 +0000 http://blog.tinned-software.net/?p=1328 Because most passwords are quite short so you can remember them as well as it is annoying to type the password all the time, You might have already considered creating SSH-keys and configured the SSH passwordless login with SSH-key for your server. But how to secure the access with SSH-key? Continue reading

The post Restrict SSH login using SSH keys to a particular IP address appeared first on Experiencing Technology.

]]>
Secure SSH server access https://blog.tinned-software.net/secure-ssh-server-access/ Mon, 03 Mar 2014 07:17:36 +0000 http://blog.tinned-software.net/?p=1023 With a server running, SSH is one of the services nearly instantly gets checked out. Only after a couple of hours of going live with your server, you might already notice someone trying to login with passwords from a dictionary. There are some things you can do to reduce those hacking attempts to your SSH server. Continue reading

The post Secure SSH server access appeared first on Experiencing Technology.

]]>
Change SSH port in CentOS with SELinux https://blog.tinned-software.net/change-ssh-port-in-centos-with-selinux/ Wed, 12 Feb 2014 08:25:21 +0000 http://blog.tinned-software.net/?p=1017 Since version 4 of CentOS, SELinux is providing an additional layer of security to the Linux distribution. As of SELinux in combination with sshd, changing the port or even listening on 2 ports is not as easy as just changing the sshd configuration file. Continue reading

The post Change SSH port in CentOS with SELinux appeared first on Experiencing Technology.

]]>
Restrict Linux User to SCP to his home directory https://blog.tinned-software.net/restrict-linux-user-to-scp-to-his-home-directory/ Mon, 28 Oct 2013 06:46:56 +0000 http://blog.tinned-software.net/?p=820 You wanna give access to your server? But you want to restrict access to SCP/SFTP and to the user's home directory. Here is how i configured an account restricted to SCP/SFTP only using jailkit on CentOS. Continue reading

The post Restrict Linux User to SCP to his home directory appeared first on Experiencing Technology.

]]>
Subversion via ssh using authorized_keys https://blog.tinned-software.net/subversion-via-ssh-using-authorized_keys/ Tue, 03 Sep 2013 22:03:19 +0000 http://blog.tinned-software.net/?p=723 When i used subversion in the past i created a separate user on the linux operating system. This user then got the right to login via ssh to use subversion. If you have one or two users to manage that is not a big deal. But when the amount of users is growing ... Continue reading

The post Subversion via ssh using authorized_keys appeared first on Experiencing Technology.

]]>
SSH remote host identification has changed https://blog.tinned-software.net/ssh-remote-host-identification-has-changed/ Fri, 16 Aug 2013 19:16:37 +0000 http://blog.tinned-software.net/?p=812 You might know the situation when you try to login to a server via ssh and instead of the console you get the "REMOTE HOST IDENTIFICATION HAS CHANGED" Warning. Here is how to deal with it. Continue reading

The post SSH remote host identification has changed appeared first on Experiencing Technology.

]]>
SSH passwordless login with SSH-key https://blog.tinned-software.net/ssh-passwordless-login-with-ssh-key/ Fri, 05 Jul 2013 21:06:17 +0000 http://blog.tinned-software.net/?p=893 Whenever you connect to a server via SSH you have to enter your password. If you have to connect often, it might start to be annoying to entering the password on every attempt to connect to the server. Isn't there some easier way? Yes there is! I will show here how to set this up. Continue reading

The post SSH passwordless login with SSH-key appeared first on Experiencing Technology.

]]>