About 50 results
Open links in new tab
  1. Can someone explain how sshd does privilege separation?

    sshd 10072 0.2 0.0 71272 3016 ? S 10:56 0:00 \_ sshd: unknown [net] There you see the privileged process running under root privileges (10071) and net-child (sshd: user [net], running under sshd …

  2. QID 38909 SHA1 deprecated setting for SSH (RHEL 8.6)

    Dec 23, 2024 · The ssh -Q key command lists the key types that are supported by the SSH client. The output from the /usr/bin/sshd -tT command you posted lists the ciphers that are enabled on the SSH …

  3. openssh - What are these: "sshd-session: banner exchange ... invalid ...

    Jul 7, 2025 · sshd-session[PID]: banner exchange: Connection from ip.add.res.s port PORT: invalid format The IP-addresses are from all over the world, so, obviously, these aren't legitimate …

  4. RHEL in FIPS mode ignores crypto subpolicy

    Sep 26, 2024 · It appears that in FIPS mode, by default, sshd uses hardcoded values for the ciphers, instead of using the values from the crypto policy. In RHEL 9, the back-end file generated by crypto …

  5. OpenSSH Disabling Diffie-Hellman (DHE) key exchange

    Aug 12, 2022 · I'm seeking to mitigate CVE-2002-20001 by disabling DHE key exchange through OpenSSH on an Ubuntu instance. I understand this can be achieved through editing the …

  6. OpenSSH default/preferred ciphers, hash, etc for SSH2

    25 When using OpenSSH server (sshd) and client (ssh), what are all of the default / program preferred ciphers, hash, etc. (security related) and their default options (such as key length)? So, what are the …

  7. Can I require both private key and password authentication for SSH ...

    Dec 5, 2023 · As to requiring both, that's seems silly and counterproductive, and checking man sshd_config there isn't an option to do this. Your ssh private key should have a secure passphrase. …

  8. ssh authentication: is it possible to have password OR keys?

    Apr 14, 2022 · In your sshd_config file, set the following: PubkeyAuthentication yes PasswordAuthentication yes Then, restart sshd. Also, if I issue the "ssh-keygen -t rsa" command on …

  9. ssh - What's the purpose? Strange login attemps "sshd [***] Received ...

    My gut feeling is the authors of the provided rules expected the associated log entries that you mentioned and so only included those. Re the point of this attack, I do think that the attack is not …

  10. Secure Configuration of Ciphers/MACs/Kex available in SSH

    Note that this question is not about 0-days or other related flaws in the SSH code and is specifically about the best possible arrangement and configuration of the ciphers, KexAlgorithms, and MACs. If …