All Questions
29 questions
0votes
2answers
108views
Is my Linux inside virtual box being hacked or is it my base system; windows which is compromised?
There's a Oracle Linux running inside a Virtual Box, which is running on Windows 11 home. Need help understanding: Is there any chance of any of either the linux or , as this clearly appears to be a ...
0votes
0answers
152views
How to understand that my server was used for ssh-bruteforce attack?
my VPS provider told me that there was an ssh-bruteforce attack from my server. I've checked sessions with "last" command, but there was no active root session during attack time. The "...
2votes
1answer
621views
How to completely disable SSH commenting?
I am trying to completely disable SSH comments. Running ssh-keygen -C "" -f test results in: ssh-keygen -l -f test.pub 3072 SHA256:Ir9Q4ykMBl0zx/NaCQGGx/qmEFIX84qaHDzFA0SzevE no comment (...
0votes
1answer
250views
RFC: ssh -X to run a java app on login via SHELL variable, security and other issues?
I have a java application (not applet) which I run via a script which contains just this: #!/bin/sh /usr/bin/java -classpath /A/B.jar:/X/Y.jar MyApp.Go -p 1 -p 2 -p 3 This app, during initialisation, ...
0votes
0answers
64views
How to make sure two people are present when accessing a database on a server
My friends and I have a Mattermost instance up on a server through this set up. Mattermost does not support e2e encryption and we have a container with a Postgres database running that stores all of ...
0votes
0answers
54views
Connection refused with public key
I need an urgent help please, I have created, as root, a file /home/A/.ssh/authorized_keys for user A. Then I changed the /etc/ssh/sshd_config to PasswordAuthentication no and AllowUsers A and ...
1vote
1answer
3kviews
Server being attacked with key exchange attempts. Not being added to ban list by fail2ban
Looking through the sshd logs, there is a remote machine which appears to be attacking my server. here is an example of an entry. It is always the same IP. May 8 17:57:32 [removed] sshd[99267]: ...
0votes
1answer
260views
How pssh do the ssh activities without password
the follwing pssh command do a parallel as date pssh -i -H "master01 master02 master03 worker01 worker02" -l root -x '-q -o StrictHostKeyChecking=no -o GSSAPIAuthentication=no -o ...
1vote
1answer
2kviews
Security implications of SSH Port Forwarding/Tunneling
I need help understanding the security implications of having an outgoing ssh tunnel in my system (what is the risk and could it be a security hole?). I am using the following command to forward port ...
0votes
0answers
395views
SSH host key changes after server gets patched
I noticed in place that I worked that when a linux machine (a VM actually and a service guard cluster) is patched, its SSH host key changed. @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@...
3votes
1answer
3kviews
how to find ssh key in audit log file?
i've created ssh key for connecting two host (client 192.168.4.107 and server 192.168.4.106). on client-machine i've run this command and ssh connection works: ssh-keygen ssh-copy-id -i /root/.ssh/...
0votes
1answer
1kviews
SSH IP access restriction using tcpwrappers is not working. (hosts.allow and hosts.deny not taken into account)
I am using sles-12 server and i am trying to restrict ssh access to my server to my pc alone. I have tried to use tcpwrappers and it's not working..!!. I am able to ssh to the server from any IP in my ...
0votes
1answer
770views
Open new ssh session via existing ssh -N session
Assume that I have an ssh tunnel running in the background, e.g.: ssh -L 1478:localhost:1478 admin@m1 -N And I want to connect to m1, however, in the time between starting the tunnel and now, I've ...
0votes
1answer
68views
What config files I need to verify to make sudo work?
I am new to Linux. I have created 2 Azure VMs based on Cent OS 7.4 for learning purposes. For the first machine, I provided SSH keys during the create procedure. I use the private key via putty and ...
2votes
1answer
2kviews
linux/unix command for checking the outside/inside network connections
From my local machine, which command can tell me which machines I have connected via ssh, or ftp, etc? At the same time, which command can let me know which machines have tried to connect my machine ...