macOS

Figuring out GPG, SSH and U2F with YubiKey 4

You know your wife is a keeper when she gets you a YubiKey 4 for your birthday! I was really excited about this YubiKey because of its support for storing your GPG private keys and also for an SSH private key, in addition to the U2F (Universal 2nd Factor) support. I've been using earlier versions of the YubiKey for OTP (one-time password) and U2F, but the new version was especially interesting to me because of ...

Read More

macOS

Two SSH clients to consider for the iPad

This week's mac tip is Two SSH clients to consider for the iPad. In this tip I look at two really great SSH clients for the iPad (and iPhone as well, although I was mostly just looking at the iPad versions which do vary from their iPhone counterpart): iSSH and Prompt. Really great clients for anyone that needs to SSH into a remote box. They're quite inexpensive and very well done.

Read More

Linux

Tips and tricks to help you do more with OpenSSH

Last week's techmail was Tips and tricks to help you do more with OpenSSH which is a followup to the previous tip that talked about OpenSSH key management. This one gives you a few one-liner tips to stimulate the imagination (yet are useful on their own) with the kinds of things you can do with OpenSSH, such as encrypted tunnels to remote hosts, creating a SOCKS5 proxy with OpenSSH, and running remote X ...

Read More

Linux

What you need to know about OpenSSH key management

This week's techmail is What you need to know about OpenSSH key management which looks at a few tips and tricks in using OpenSSH public/private keys. It talks about generating keys, using ssh-copy-id to copy keys to servers, and using hashed representations of host keys to obscure what machines you connect to in case someone is able to look at your known_hosts file. If you're not familiar with OpenSSH or want to ...

Read More

Linux

Secure remote firewall administration via SSH

This week's TechMail is Secure remote firewall administration via SSH which talks about using ssh to create a secure tunnel to a remote network/system to use with configuring a remote firewall. I use this quite a bit with remotely-deployed pfSense boxen to configure it using the web interface and it works great. Of course, the nice thing with ssh tunnels is you can use them for darn near everything, but this is ...

Read More

Linux

Towards responsible disclosure

This week was interesting, dealing with the supposed "OpenSSH 0day" vulnerability stuff... rumours, innuendo, strange logs and packet capture files... it made for a long week trying to keep an eye on this and sort fact from fiction. Instead of focusing on the issue itself like other blogs and news sites are doing, I thought it might be interesting to look at some general resources to aid in the responsible disclosure of issues. ...

Read More

Linux

Remotely monitor servers with the Nagios check_by_ssh plugin

This week's TechMail is Remotely monitor servers with the Nagios check_by_ssh plugin which discusses using the check_by_ssh plugin in Nagios to get local plugin results from remote systems, via ssh. I use this to monitor my VPS and other remote systems so I can see things like load average, disk usage, etc. on remote systems without setting up the Nagios remote monitoring stuff. Works fantastic.

Read More