social.tchncs.de is one of the many independent Mastodon servers you can use to participate in the fediverse.
A friendly server from Germany – which tends to attract techy people, but welcomes everybody. This is one of the oldest Mastodon instances.

Administered by:

Server stats:

3.8K
active users

#openssh

18 posts17 participants3 posts today

La décima versión de OpenSSH viene con el algoritmo mlkem768xto25519-sha256 activado por defecto, que se considera seguro ante ataques con ordenadores cuánticos y además se ha convertido en norma en el NIST #openssh -> hardlimit.com/archivo.php?n=22

hardlimit.comPrimera página | Portada HardlimitToda la actualidad del hardware y el software. Visita nuestros foros y comprueba el rendimiento de tu procesador con nuestro banco de pruebas.

I see #OpenSSH got to fully removing DSA key support, so that means my “probably do that in #Paramiko” todo list item has no more excuses 🤔

Well, ok, it still has a few excuses (will be years before the average sshd is OpenSSH 10.0+) but still. Needs happenin' sometime and it ain't like old releases go away, so.

Continued thread

Also: #Slackware 15 has a security update for Python3:

slackware.com/security/viewer.

Slackware-current just adopted #OpenSSH 10.0.p1 & #OpenSSL 3.5

n/openssh-10.0p1-x86_64-1.txz: Upgraded. Potentially-incompatible changes include the removal of the weak DSA signature algorithm, completing the deprecation process that began in 2015 (when DSA was disabled by default) and repeatedly warned over the last 12 months.

n/openssl-3.5.0-x86_64-1.txz: Upgraded. New LTS release, supported until 08 Apr 2030.

www.slackware.comThe Slackware Linux Project: Slackware Security Advisories

9.8 und höher kommt allmählich auf die Server. Da wird die Option PerSourcePenalties interessant (siehe undeadly.org/cgi?action=articl ) die fail2ban u.ä. überflüssig machen könnte.

Konfig-Beispiele sind aber noch rar gesät. Nach der manpage zu urteilen, sollte aber

PerSourcePenalties authfail:3600s

dafür sorgen dass IPs, die Brute-Force Attacken fahren für 1 Stunde geblockt werden, korrekt?

undeadly.orgOpenSSH introduces options to penalize undesirable behavior
Ooph, updated the sshd-session.c patch that MacPorts uses (to try to sandbox things, whoever did that was before my time) and while the patch I modified applies OK, the OpenSSH 10.0p1 build still fails with MacPorts' additional "special sauce".

I updated the Trac issue with as far as I got here:

https://trac.macports.org/ticket/72317

But I need to step AFK for a while and won't be able to look at this again for several hours.

If others want to take a crack at it and fix whatever I failed to get correct, contributions are more than welcome!

Thanks!

(and here I was thinking the legacy_dsa variant removal would be my potential stumbling block. Nope! sigh I should have tested the snapshot more thoroughly I guess, but I still don't have a functional mpbb locally and I don't even want to get into my "methodology" for diffing this stuff locally, it's basically line by line with not such great tools.)

Near as I can discern sshd-session.c got reworked a bit since 9.9p2 and my shoot from the hip attempt is insufficient.

#OpenSSH #MacPorts
trac.macports.org#72317 (update OpenSSH 10.0p1) – MacPorts
Replied in thread

@JessTheUnstill @Pibble

And yes, I treat all devices as insecure and would rather invest the time and effort needed get #TechIlliterates up to speed on the #OfflinePGP method!

Given the cheapness of storage (legitimate 1TB microSD cards exist and they ain't 4-digit items!) I'd legitimately look into #OTP #encryption and (IF I had the €€€€€€ to do so!) would even sponsor implementing it in #OpenVPN, #WireGuard and #OpenSSH (for #SSH-Tunmeling).

  • The #US is a #RogueNation with a Rogue Government! The sooner we accept this reality the sooner we can not only adjust to it but act accordingly…

I sincerely wish y'all could legitimately call me a tinfoilhat but so far I've been proven right all the time...