Skip to main content

All Questions

Tagged with
0votes
2answers
108views

Is my Linux inside virtual box being hacked or is it my base system; windows which is compromised?

There's a Oracle Linux running inside a Virtual Box, which is running on Windows 11 home. Need help understanding: Is there any chance of any of either the linux or , as this clearly appears to be a ...
Layman's user avatar
0votes
0answers
152views

How to understand that my server was used for ssh-bruteforce attack?

my VPS provider told me that there was an ssh-bruteforce attack from my server. I've checked sessions with "last" command, but there was no active root session during attack time. The "...
Phagozit's user avatar
2votes
1answer
621views

How to completely disable SSH commenting?

I am trying to completely disable SSH comments. Running ssh-keygen -C "" -f test results in: ssh-keygen -l -f test.pub 3072 SHA256:Ir9Q4ykMBl0zx/NaCQGGx/qmEFIX84qaHDzFA0SzevE no comment (...
cppbest's user avatar
0votes
1answer
250views

RFC: ssh -X to run a java app on login via SHELL variable, security and other issues?

I have a java application (not applet) which I run via a script which contains just this: #!/bin/sh /usr/bin/java -classpath /A/B.jar:/X/Y.jar MyApp.Go -p 1 -p 2 -p 3 This app, during initialisation, ...
bliako's user avatar
0votes
0answers
64views

How to make sure two people are present when accessing a database on a server

My friends and I have a Mattermost instance up on a server through this set up. Mattermost does not support e2e encryption and we have a container with a Postgres database running that stores all of ...
Nithin Saripalli's user avatar
0votes
0answers
54views

Connection refused with public key

I need an urgent help please, I have created, as root, a file /home/A/.ssh/authorized_keys for user A. Then I changed the /etc/ssh/sshd_config to PasswordAuthentication no and AllowUsers A and ...
user2971637's user avatar
1vote
1answer
3kviews

Server being attacked with key exchange attempts. Not being added to ban list by fail2ban

Looking through the sshd logs, there is a remote machine which appears to be attacking my server. here is an example of an entry. It is always the same IP. May 8 17:57:32 [removed] sshd[99267]: ...
user3728501's user avatar
0votes
1answer
260views

How pssh do the ssh activities without password

the follwing pssh command do a parallel as date pssh -i -H "master01 master02 master03 worker01 worker02" -l root -x '-q -o StrictHostKeyChecking=no -o GSSAPIAuthentication=no -o ...
yael's user avatar
  • 13.9k
1vote
1answer
2kviews

Security implications of SSH Port Forwarding/Tunneling

I need help understanding the security implications of having an outgoing ssh tunnel in my system (what is the risk and could it be a security hole?). I am using the following command to forward port ...
Lynx's user avatar
0votes
0answers
395views

SSH host key changes after server gets patched

I noticed in place that I worked that when a linux machine (a VM actually and a service guard cluster) is patched, its SSH host key changed. @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@...
Demeter P. Chen's user avatar
3votes
1answer
3kviews

how to find ssh key in audit log file?

i've created ssh key for connecting two host (client 192.168.4.107 and server 192.168.4.106). on client-machine i've run this command and ssh connection works: ssh-keygen ssh-copy-id -i /root/.ssh/...
Francisco Sour's user avatar
0votes
1answer
1kviews

SSH IP access restriction using tcpwrappers is not working. (hosts.allow and hosts.deny not taken into account)

I am using sles-12 server and i am trying to restrict ssh access to my server to my pc alone. I have tried to use tcpwrappers and it's not working..!!. I am able to ssh to the server from any IP in my ...
Ajay Joseph's user avatar
0votes
1answer
770views

Open new ssh session via existing ssh -N session

Assume that I have an ssh tunnel running in the background, e.g.: ssh -L 1478:localhost:1478 admin@m1 -N And I want to connect to m1, however, in the time between starting the tunnel and now, I've ...
George's user avatar
0votes
1answer
68views

What config files I need to verify to make sudo work?

I am new to Linux. I have created 2 Azure VMs based on Cent OS 7.4 for learning purposes. For the first machine, I provided SSH keys during the create procedure. I use the private key via putty and ...
B K's user avatar
2votes
1answer
2kviews

linux/unix command for checking the outside/inside network connections

From my local machine, which command can tell me which machines I have connected via ssh, or ftp, etc? At the same time, which command can let me know which machines have tried to connect my machine ...
user288609's user avatar

153050per page
close